hack and bug bounty
@hack_com
22
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
22 subscribers
hack and bug bounty
How I Find API disclosure $$$
Medium
How I Find API disclosure $$$
Hello BUG HUNTERS,
hack and bug bounty
Subdomain takeover via Frill.co
Medium
Subdomain takeover via Frill.co
Exploiting subdomain takeover via Frill (A Customer feedback, Roadmap and Announcements tool).
hack and bug bounty
GitHub Dorking
Medium
GitHub Dorking
What is GitHub?
hack and bug bounty
The Hidden SQL Injection Techniques That Google Doesn’t Want You To Know
Medium
The Hidden SQL Injection Techniques That Google Doesn’t Want You To Know
💻
😱
😈
Conquer Web Apps with SQLMap — The Ultimate User Guide
hack and bug bounty
Bug Bounty Chronicles: an SQL death spiral
Medium
Bug Bounty Chronicles: an SQL death spiral
TLDR: On my first bug bounty program I spent a week chasing down what looked like an sql injection bug, only to have no sleep and no…
hack and bug bounty
Zero Trust Architecture (ZTA): A Paradigm Shift in Network and Data Security”
Medium
Zero Trust Architecture (ZTA): A Paradigm Shift in Network and Data Security”
In an era where cyber threats have become increasingly sophisticated and pervasive, traditional security models based on perimeter defenses…
hack and bug bounty
Basics of Information Disclosure Vulnerability in Web App Penetration Testing | 2023
Medium
Basics of Information Disclosure Vulnerability in Web App Penetration Testing | 2023
Unveiling the Secrets of Information Disclosure Vulnerabilities | Karthikeyan Nagaraj
hack and bug bounty
Mobile App Penetration Testing — Part 1 (Setup)
Medium
Mobile App Penetration Testing — Part 1 (Setup)
Mobile apps are vulnerable to various security risks and threats due to their connectivity, complexity, and the sensitive data they often…
hack and bug bounty
Title: “Ethical Hacking: Penetration Testing — Where Geek Meets Glam”
Medium
Title: “Ethical Hacking: Penetration Testing — Where Geek Meets Glam”
Introduction: Picture this: A dimly lit room, computer screens flickering like the latest blockbuster movie, and a hacker, dressed like…
hack and bug bounty
Wgel CTF: Walkthrough
Medium
Wgel CTF: Walkthrough
This is a very easy machine, in which we have to get into the machine through SSH and then we have to escalate our privileges to get the…
hack and bug bounty
How To Hack Someone’s Phone Camera Using VidPhisher.
Medium
How To Hack Someone’s Phone Camera Using VidPhisher.
hack and bug bounty
Ethical Hacking: From Beginner to Certified Professional — My Story
Medium
Ethical Hacking: From Beginner to Certified Professional — My Story
Welcome, dear readers, to a journey that took me from a curious beginner to a certified professional in the thrilling world of ethical…
hack and bug bounty
“Hacking Instagram — Scary Easy!”
Medium
“Hacking Instagram — Scary Easy!”
In today’s era, hacking has become quite accessible, and many individuals gets engaged in it for fun, even if they don’t know the basics…
hack and bug bounty
What is server side vulnerabilities?
Medium
What is server side vulnerabilities?
Server-side vulnerabilities refer to weaknesses or flaws in the software, services, or configurations running on a server that can be…
hack and bug bounty
CYBER TIPS 2023 BY DIGITAL YODHA
Medium
CYBER TIPS 2023 BY DIGITAL YODHA
In today’s digital age, debit cards have become an indispensable part of our financial lives. They offer convenience and easy access to our…
hack and bug bounty
Your Website Got an F in Security
Medium
Your Website Got an F in Security
Let’s look at that F and what it actually means — when it matters and when it does not
hack and bug bounty
Dirhunt: Modern Tool To Find Hidden Information
Medium
Dirhunt: Modern Tool To Find Hidden Information
First of all let me clear that, if you thinking that this will replace dirsearch then this is a bad idea, You have to use both together to…
hack and bug bounty
InfoSecSherpa’s News Roundup for Saturday, September 9, 2023
Medium
InfoSecSherpa’s News Roundup for Saturday, September 9, 2023
InfoSecSherpa: Your Guide Up a Mountain of Information!
hack and bug bounty
What is Client side vulnerability?
Medium
What is Client side vulnerability?
A client-side vulnerability refers to a security weakness or flaw that exists on the client side of a computer system or application. The…
hack and bug bounty
Red Team Methodologies
Medium
Red Team Methodologies
Red team methodologies are structured approaches that red teams, which are groups of skilled cybersecurity professionals, use to assess and…
hack and bug bounty
Different Types of Man-In-The-Middle Attacks
Medium
Different Types of Man-In-The-Middle Attacks
Different points of MITM attack and how they can affect victims and websites