hack and bug bounty
@hack_com
22
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
22 subscribers
hack and bug bounty
The Essential Programming Languages for Cyber Security.
Medium
The Essential Programming Languages for Cyber Security.
Hello my dear hackers, this is your friend Sagar. Welcome back to my new article with another hot, importent and interesting topic, I hope you all are good, happy and secure at your home. Today we…
hack and bug bounty
Leaked Database and SMTP credentials through .env file
Medium
Leaked Database and SMTP credentials through .env file
Introduction
hack and bug bounty
RCE on Application’s Tracking Admin Panel
Medium
RCE on Application’s Tracking Admin Panel
In this blog post, we’ll explore some intriguing scenarios where the add extension functionality in a particular subdomain can be exploited to enable a Remote Code Execution vulnerability. The…
hack and bug bounty
Ways I followed to Bypass ‘403’ — Your checklist
Medium
Ways I followed to Bypass ‘403’ — Your checklist
Hello people! Hope you all are doing well.
hack and bug bounty
Frontend Fumbles: The 250$ Curious Case of API Key Permissions.
Medium
Frontend Fumbles: The 250$ Curious Case of API Key Permissions.
Today, we’re about to discuss one such twist — an issue that holds the power to disrupt the balance between security and access. In web…
hack and bug bounty
How to Discover API Subdomains? | API Hacking |
Medium
How to Discover API Subdomains? | API Hacking |
In this article, we will delve into the world of API subdomains, exploring their purpose, methods to discover them, and performing API…
hack and bug bounty
Bounty of an Insecure WebView (Part 1): XSS, but with Steroids
Medium
Bounty of an Insecure WebView (Part 1): XSS, but with Steroids
We all love our mobile apps, right? They make life easier, more fun, and keep us connected. But, did you know there’s a secret weapon…
hack and bug bounty
A Tale of Weird XSS into $100
Medium
A Tale of Weird XSS into $100
Hey Guys , How are you all ? . I hope so your doing good and healthy . So, Lets get started . So , I started searching for bugbounty…
hack and bug bounty
Bypass SMS Authentication To Account Takeover
Medium
Bypass SMS Authentication To Account Takeover
Haloo guys! Artikel kali ini membahas tentang bypass OTP.. dan menurut gw pribadi ini case yang cukup unik. Sebelum masuk ke…
hack and bug bounty
Day 1: Introduction to Cybersecurity Awareness Month — The Importance of Cybersecurity Education
Medium
Day 1: Introduction to Cybersecurity Awareness Month — The Importance of Cybersecurity Education
Welcome to Cybersecurity Awareness Month! In this month-long journey, I will delve into the fascinating and ever-evolving world of…
hack and bug bounty
Twitter’s entry into the recruitment product.
Medium
Twitter’s entry into the recruitment product.
Twitter (X) will now let verified company handles share job postings. The job postings will be visible on the profile page, and people can…
hack and bug bounty
A guide on how to reproduce a bug in Software Development
Medium
A guide on how to reproduce a bug in Software Development
Recreating a bug in software development involves reproducing the issue or error that occurred during the software’s ops. This process…
hack and bug bounty
Explore the World of Network Scanning with Nmap Commands!
Medium
🌐
Explore the World of Network Scanning with Nmap Commands!
🌐
🔍
Hey fellow tech enthusiasts! Ever wondered how to uncover the hidden secrets of a network? Look no further than Nmap, your trusty…
hack and bug bounty
TryHackMe — Athena Walkthrough
Medium
TryHackMe — Athena Walkthrough
On a hot September afternoon, I thought I could relax by playing around with a machine available on TryHackMe. In the end, I decided to go with “Athena.” I must admit that I found every phase of the…
hack and bug bounty
Explore the World of Cybersecurity Scanning Tools!
Medium
🔐
🔍
Explore the World of Cybersecurity Scanning Tools!
🔍
🔐
Hey #CybersecurityEnthusiasts
👨💻
👩💻
hack and bug bounty
InfoSecSherpa’s News Roundup for Sunday, October 1, 2023
Medium
InfoSecSherpa’s News Roundup for Sunday, October 1, 2023
InfoSecSherpa: Your Guide Up a Mountain of Information!
hack and bug bounty
ROADMAP to OSCP in 6 months starting from scratch️♂️
Medium
ROADMAP to OSCP in 6 months
👨💻
starting from scratch
🏋️♂️
Basics: ~ First get your foundations clear and strong. > Start with Networking topics like TCP, UDP, HTTP, DNS, DHCP and ARP
hack and bug bounty
Services Runtime Security — Part 4
Medium
Services Runtime Security — Part 4
An Alternate Approach
hack and bug bounty
My Bug Bounty Journey & Ranking 15th in U.S…
Medium
My Bug Bounty Journey & Ranking 15th in U.S…
Hello,
hack and bug bounty
Cyber Awareness Month: Day 1 — Who requires Cyber Security?
Medium
Cyber Awareness Month: Day 1 — Who requires Cyber Security?
A common question by many people is that I do not work in the IT industry or related to computers through profession. And, is…
hack and bug bounty
$1000 Bug using simple Graphql Introspection query
Medium
$1000 Bug using simple Graphql Introspection query
Welcome to my blog! In this post, I will be discussing my experience in the security testing of an application’s implementation of…