hack and bug bounty
@hack_com
22
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
22 subscribers
hack and bug bounty
what is an application security engineer?
Medium
what is an application security engineer?
If you are interested in becoming an application security engineer, you can start by earning a bachelor’s degree in cybersecurity and…
hack and bug bounty
Sajjad Hossan, born on February 6, 2006, in Bangladesh, is a young and exceptionally talented…
Medium
Sajjad Hossan, born on February 6, 2006, in Bangladesh, is a young and exceptionally talented…
ABOUT THE STORY
hack and bug bounty
The Windows Process Journey — “takeown.exe” (Takes Ownership of a File)
Medium
The Windows Process Journey — “takeown.exe” (Takes Ownership of a File)
“takeown.exe” (Takes ownership of a file) is a PE binary located at “%windir%\System32\takeown.exe”. It is a CLI tool which allows an…
hack and bug bounty
Writeups for Damn Vulnerable Web Application (DVWA)
Medium
Writeups for Damn Vulnerable Web Application (DVWA)
DVWA Writeups
hack and bug bounty
October is here… The Cybersecurity Awareness Month
Medium
October is here… The Cybersecurity Awareness Month
In today's world, where our lives are increasingly shaped by technology, there's a pressing need for us all to become more aware of the…
hack and bug bounty
The Rise of Rust
Medium
The Rise of Rust
In the world of system-level programming, a new titan has emerged, challenging the age-old dominion of languages like C and C++. Enter…
hack and bug bounty
“Template Injection” The Future of Web Application Attacks
Medium
“Template Injection” The Future of Web Application Attacks
Introduction
hack and bug bounty
“Beyond SSTI” Advanced Template Injection Techniques for Bug Bounty Hunters
Medium
“Beyond SSTI” Advanced Template Injection Techniques for Bug Bounty Hunters
Introduction
hack and bug bounty
Top 5 Security Resources for 2023–10–1
Medium
Top 5 Security Resources for 2023–10–1
Here are my favorite 5 security resources added to my security resource database since yesterday. These resources will range from blogs and Reddit posts, through paid resource subscriptions and…
hack and bug bounty
2-Minutes Hacking
Medium
2-Minutes Hacking
Hack any device in 120 seconds
hack and bug bounty
Template Injection: The Unseen Menace of the Web
Medium
Template Injection: The Unseen Menace of the Web
Introduction
hack and bug bounty
Password Security: Let’s Hash This Out
Medium
Password Security: Let’s Hash This Out
The database containing the login credentials of millions of users of ilovecats.com has been compromised and, as a result, malicious…
hack and bug bounty
Navigating Compliance and Security Auditing: A Comprehensive Guide
Medium
Navigating Compliance and Security Auditing: A Comprehensive Guide
Introduction
hack and bug bounty
XML External Entity (XXE) Injection in Web App Penetration Testing | 2023
Medium
XML External Entity (XXE) Injection in Web App Penetration Testing | 2023
In this section, we’ll explain what XML external entity injection is, describe some common examples, explain how to find and exploit…
hack and bug bounty
Ethical Hacking: Proses penyadapan koneksi FTP(MIMA)
Medium
Ethical Hacking: Proses penyadapan koneksi FTP(MIMA)
Learn how to secure your connection with server
hack and bug bounty
X explores digital payments and cryptos
Medium
X explores digital payments and cryptos
Formerly known as Twitter, X is exploring new avenues to expand its offerings and boost user engagement. Among these is the realm of…
hack and bug bounty
Evaluating AppSec solutions: from theory to practice
Medium
Evaluating AppSec solutions: from theory to practice
How to benchmark properly your *AST tools
hack and bug bounty
ChatGPT: The Ultimate Tool for Penetration Testers — SecurityCipher
Medium
ChatGPT: The Ultimate Tool for Penetration Testers — SecurityCipher
As a penetration tester or bug bounty hunter, you know the importance of having the right tools at your disposal. ChatGPT is a powerful AI…
hack and bug bounty
“The Art of Template Injection” An In-Depth Look at the Latest Attack Techniques
Medium
“The Art of Template Injection” An In-Depth Look at the Latest Attack Techniques
Introduction
hack and bug bounty
Exploring the DarkWeb for Crypto Attack Intelligence
Medium
Exploring the DarkWeb for Crypto Attack Intelligence
Introduction
hack and bug bounty
The Rise of Quantum-Safe Cryptography in the Age of Crypto-Attacks
Medium
The Rise of Quantum-Safe Cryptography in the Age of Crypto-Attacks
Introduction