hack and bug bounty
@hack_com
22
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
22 subscribers
hack and bug bounty
Threat modeling Handbook #4: How to get better at Threat modeling
Medium
Threat modeling Handbook #4: How to get better at Threat modeling
I know the previous story of this series (links to all previous stories below) was a bit long and may have been a little overwhelming…
hack and bug bounty
Exploring the World of Cybersecurity Domains
Medium
Exploring the World of Cybersecurity Domains
In today’s digital age, cybersecurity is paramount. As technology advances, so do the threats that can compromise our online security. To…
hack and bug bounty
Market Share Insights: Dominant Players in the Web Application Firewall Arena
Medium
Market Share Insights: Dominant Players in the Web Application Firewall Arena
A Web Application Firewall (WAF) serves as a protective shield for web assets and customers against web-based attacks and malicious…
hack and bug bounty
Introduction to Fortify Software Security Center: A Comprehensive Guide
Medium
Introduction to Fortify Software Security Center: A Comprehensive Guide
hack and bug bounty
Mobile App Security: A Deep Dive into Resilience & Credential Management
Medium
Mobile App Security: A Deep Dive into Resilience & Credential Management
In this article we talk about how to build resilient Mobile Applications and how to securely manage User Credentials within them
hack and bug bounty
Secure Development: Shift-left with SAST
Medium
Secure Development: Shift-left with SAST
Secure development is a set of practices which integrates security in the early stage of development and across each phase of the…
hack and bug bounty
DevOps 2023: Make your Applications more secure using the Fuzzy Testing technique
Medium
DevOps 2023: Make your Applications more secure using the Fuzzy Testing technique
Understanding Fuzzing in 2023 to make your Applications more secure
hack and bug bounty
Extracting Sensitive Data from HTML and JS Files.
Medium
Extracting Sensitive Data from HTML and JS Files.
Hello Friends,
I hope you have a good day and enjoy reading :”)
hack and bug bounty
ProductSec Increases Developer Velocity
Medium
ProductSec Increases Developer Velocity
In the fast-paced world of software development, speed and efficiency are key. A Software as a Service (SaaS) product security platform…
hack and bug bounty
Comprehensive Guide to Discovering Hidden Subdomains: RedHat Teamign
Medium
Comprehensive Guide to Discovering Hidden Subdomains: RedHat Teamign
Hello everyone hope you all having a good day my name is Imran I am a senior security researcher with around 5 to 6 years of experience in…
hack and bug bounty
Package crypto/ecdh is not in GOROOT
Medium
Package crypto/ecdh is not in GOROOT
Hi there, you might have received an error “package crypto/ecdh is not in GOROOT” during any Go language based tool installation.
hack and bug bounty
Server-side request forgery (SSRF) in Web App Penetration Testing | 2023
Medium
Server-side request forgery (SSRF) in Web App Penetration Testing | 2023
Understanding the Concept of SSRF in Web Application Penetration Testing for Bug Bounty | Karthikeyan Nagaraj
hack and bug bounty
Canvas of Intrigue: A `Refreshing` Approach to Session Token Exfiltration with XSS
Medium
Canvas of Intrigue: A `Refreshing` Approach to Session Token Exfiltration with XSS
A story of infiltration transcending security layers with a novel approach
hack and bug bounty
Dodge the ITIL Traps: Mistakes & Misadventures in IT Service Management!
Medium
Dodge the ITIL Traps: Mistakes & Misadventures in IT Service Management!
We've all had those days – you assemble a piece of IKEA furniture, only to find a screw missing. Or you bake a cake and realize you forgot the sugar. Implementing ITIL in IT can feel the same way…
hack and bug bounty
Exploiting Keepass
Medium
Exploiting Keepass
In an era where cybersecurity threats are increasingly sophisticated, the importance of secure password management cannot be overstated…
hack and bug bounty
10.2 Lab: Basic SSRF against another back-end system | 2023
Medium
10.2 Lab: Basic SSRF against another back-end system | 2023
This lab has a stock check feature that fetches data from the internal system. Use the stock check functionality to scan the internal…
hack and bug bounty
Decrypting Requests, Manipulating Responses to Gaining Super Admin Access
Medium
Decrypting Requests, Manipulating Responses to Gaining Super Admin Access
Summary:
hack and bug bounty
Caldera: Revolutionizing Cybersecurity with an Unparalleled Framework
Medium
Caldera: Revolutionizing Cybersecurity with an Unparalleled Framework
Welcome to our YouTube video on “Unveiling Caldera: Empowering Cybersecurity with a Potent Framework”! In this informative video, we delve…
hack and bug bounty
NucleiFuzzer: Automating XSS Detection for Unrivaled Security
Medium
NucleiFuzzer: Automating XSS Detection for Unrivaled Security
In this video, we introduce NucleiFuzzer, an exceptionally powerful automation tool designed specifically for detecting cross-site…
hack and bug bounty
The Art of Identifying X$$ & WAF Bypass Fuzzing Technique
Medium
The Art of Identifying X$$ & WAF Bypass Fuzzing Technique
A smart way to hunt Cross-Site Scripting vulnerability
hack and bug bounty
“Template Injection” A Case Study of a Successful Bug Bounty Hunt
Medium
“Template Injection” A Case Study of a Successful Bug Bounty Hunt
Introduction