hack and bug bounty
@hack_com
22
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
22 subscribers
hack and bug bounty
Password Security: Let’s Hash This Out
Medium
Password Security: Let’s Hash This Out
The database containing the login credentials of millions of users of ilovecats.com has been compromised and, as a result, malicious…
hack and bug bounty
Navigating Compliance and Security Auditing: A Comprehensive Guide
Medium
Navigating Compliance and Security Auditing: A Comprehensive Guide
Introduction
hack and bug bounty
XML External Entity (XXE) Injection in Web App Penetration Testing | 2023
Medium
XML External Entity (XXE) Injection in Web App Penetration Testing | 2023
In this section, we’ll explain what XML external entity injection is, describe some common examples, explain how to find and exploit…
hack and bug bounty
Ethical Hacking: Proses penyadapan koneksi FTP(MIMA)
Medium
Ethical Hacking: Proses penyadapan koneksi FTP(MIMA)
Learn how to secure your connection with server
hack and bug bounty
X explores digital payments and cryptos
Medium
X explores digital payments and cryptos
Formerly known as Twitter, X is exploring new avenues to expand its offerings and boost user engagement. Among these is the realm of…
hack and bug bounty
Evaluating AppSec solutions: from theory to practice
Medium
Evaluating AppSec solutions: from theory to practice
How to benchmark properly your *AST tools
hack and bug bounty
ChatGPT: The Ultimate Tool for Penetration Testers — SecurityCipher
Medium
ChatGPT: The Ultimate Tool for Penetration Testers — SecurityCipher
As a penetration tester or bug bounty hunter, you know the importance of having the right tools at your disposal. ChatGPT is a powerful AI…
hack and bug bounty
“The Art of Template Injection” An In-Depth Look at the Latest Attack Techniques
Medium
“The Art of Template Injection” An In-Depth Look at the Latest Attack Techniques
Introduction
hack and bug bounty
Exploring the DarkWeb for Crypto Attack Intelligence
Medium
Exploring the DarkWeb for Crypto Attack Intelligence
Introduction
hack and bug bounty
The Rise of Quantum-Safe Cryptography in the Age of Crypto-Attacks
Medium
The Rise of Quantum-Safe Cryptography in the Age of Crypto-Attacks
Introduction
hack and bug bounty
“Crypto-attacks in the Supply Chain” How Bug Bounty Hunters Can Help
Medium
“Crypto-attacks in the Supply Chain” How Bug Bounty Hunters Can Help
Introduction
hack and bug bounty
How To Become A Penetration Tester (Starting Point)
Medium
How To Become A Penetration Tester (Starting Point)
Embarking on Your Journey to Becoming a Penetration Tester: The Starting Point
hack and bug bounty
Mass hunting for misconfigured S3 buckets
Medium
Mass hunting for misconfigured S3 buckets
The Power of AXIOM Part 5
hack and bug bounty
Creating custom AXIOM modules
Medium
Creating custom AXIOM modules
Taking bug bounty to the next level
hack and bug bounty
How to Setup crAPI in ubuntu server and make it network accessible
Medium
How to Setup crAPI in ubuntu server and make it network accessible
In this article we gonna setup crAPI in ubuntu server in VMware player and make crAPI accessible on a network to in order to do a…
hack and bug bounty
The Essential Programming Languages for Cyber Security.
Medium
The Essential Programming Languages for Cyber Security.
Hello my dear hackers, this is your friend Sagar. Welcome back to my new article with another hot, importent and interesting topic, I hope you all are good, happy and secure at your home. Today we…
hack and bug bounty
Leaked Database and SMTP credentials through .env file
Medium
Leaked Database and SMTP credentials through .env file
Introduction
hack and bug bounty
RCE on Application’s Tracking Admin Panel
Medium
RCE on Application’s Tracking Admin Panel
In this blog post, we’ll explore some intriguing scenarios where the add extension functionality in a particular subdomain can be exploited to enable a Remote Code Execution vulnerability. The…
hack and bug bounty
Ways I followed to Bypass ‘403’ — Your checklist
Medium
Ways I followed to Bypass ‘403’ — Your checklist
Hello people! Hope you all are doing well.
hack and bug bounty
Frontend Fumbles: The 250$ Curious Case of API Key Permissions.
Medium
Frontend Fumbles: The 250$ Curious Case of API Key Permissions.
Today, we’re about to discuss one such twist — an issue that holds the power to disrupt the balance between security and access. In web…
hack and bug bounty
How to Discover API Subdomains? | API Hacking |
Medium
How to Discover API Subdomains? | API Hacking |
In this article, we will delve into the world of API subdomains, exploring their purpose, methods to discover them, and performing API…