hack and bug bounty
@hack_com
22
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
22 subscribers
hack and bug bounty
Basics of Same-Origin Policy | by Azad
Medium
Basics of Same-Origin Policy | by Azad
The same-origin policy is a security mechanism that restricts how a javascript of one origin interact with a resource from another origin.
hack and bug bounty
Mobile Device Security: Safeguarding Your Digital World in the Age of BYOD
Medium
Mobile Device Security: Safeguarding Your Digital World in the Age of BYOD
In today’s digitally connected world, mobile devices have become indispensable tools for work and play. With the rise of Bring Your Own…
hack and bug bounty
Race Condition Vulnerabilities: A Hands-On Primer — Part 1
Medium
Race Condition Vulnerabilities: A Hands-On Primer — Part 1
Hi Everyone My name is Hashar Mujahid. I am a cyber security student and full-time freelancer. Today we will look at a topic that is…
hack and bug bounty
Critical Security Flaws in Kubernetes: Understanding CVE-2023–3676, CVE-2023–3893, and…
Medium
Critical Security Flaws in Kubernetes: Understanding CVE-2023–3676, CVE-2023–3893, and…
Introduction
hack and bug bounty
Web Intelligence Researching Domains
Medium
Web Intelligence Researching Domains
Web intelligence (WEBINT) is a means to efficiently identify the intelligence available in open source (OSINT). Structuring and visualizing…
hack and bug bounty
How to find subdomain takeover using httpx + dig
Medium
How to find subdomain takeover using httpx + dig
Hello Everyone
hack and bug bounty
A Journey into Bug Bounty Hunting: Perseverance Pays Off
Medium
A Journey into Bug Bounty Hunting: Perseverance Pays Off
Assalamualaikum everyone,
hack and bug bounty
Bug Bounty — It’s Not a Treasure Hunt, But It’s Still a Blast!
Medium
Bug Bounty — It’s Not a Treasure Hunt, But It’s Still a Blast!
Today, as we continue on our cyber adventure, let’s pause for a moment and what Bug Bounty is and, more importantly, what it isn’t.
hack and bug bounty
Remediate Web3: R.xyz
Medium
Remediate Web3: R.xyz
So, what are the chances of enhancing current techniques with additional security, and how precisely is the security of the protocol formed…
hack and bug bounty
DOM Invader and the case of direct eval vs indirect eval
PortSwigger Blog
DOM Invader and the case of direct eval vs indirect eval
What is DOM Invader? DOM Invader is a browser extension that makes it easy to find DOM based XSS by instrumenting various JavaScript functions. You can find out more about DOM Invader here: Introducin
hack and bug bounty
Managing AXIOM instances
Medium
Managing AXIOM instances
Connecting, executing commands, file transferring and snapshoting in AXIOM
hack and bug bounty
Core Functionality of AXIOM
Medium
Core Functionality of AXIOM
Headstart for your Bug Bounty Recon
hack and bug bounty
The Introduction to AXIOM
Medium
The Introduction to AXIOM
Distributed Attack Orchestration
hack and bug bounty
Reverse Search IDOR approach to Exposure of all Organizational Sensitive Information.
Medium
Reverse Search IDOR approach to Exposure of all Organizational Sensitive Information.
IDORs Everywhere.
hack and bug bounty
22.6k+ GitHub Stars Note-Taking App Hit by XSS Vulnerability
Medium
22.6k+ GitHub Stars Note-Taking App Hit by XSS Vulnerability
CVE-2023–3067: Stored Cross Site Scripting Vulnerability on renowned note-taking thick client app Trillium
hack and bug bounty
Find Bugs While Sleeping ? Get Phone Notifications When A Bug Is Found
Medium
Find Bugs While Sleeping ? Get Phone Notifications When A Bug Is Found
Hello Everyone!
hack and bug bounty
A Practical Approach to SBOM in CI/CD Part II — Deploying Dependency-Track
Medium
A Practical Approach to SBOM in CI/CD Part II — Deploying Dependency-Track
The article presents how to store and analyse Software Bill of Materials with OWASP Dependency-Track to identify security vulnerabilities…
hack and bug bounty
Threat modeling Handbook #4: How to get better at Threat modeling
Medium
Threat modeling Handbook #4: How to get better at Threat modeling
I know the previous story of this series (links to all previous stories below) was a bit long and may have been a little overwhelming…
hack and bug bounty
Exploring the World of Cybersecurity Domains
Medium
Exploring the World of Cybersecurity Domains
In today’s digital age, cybersecurity is paramount. As technology advances, so do the threats that can compromise our online security. To…
hack and bug bounty
Market Share Insights: Dominant Players in the Web Application Firewall Arena
Medium
Market Share Insights: Dominant Players in the Web Application Firewall Arena
A Web Application Firewall (WAF) serves as a protective shield for web assets and customers against web-based attacks and malicious…
hack and bug bounty
Introduction to Fortify Software Security Center: A Comprehensive Guide
Medium
Introduction to Fortify Software Security Center: A Comprehensive Guide