hack and bug bounty
@hack_com
22
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
22 subscribers
hack and bug bounty
Services Runtime Security — Part 4
Medium
Services Runtime Security — Part 4
An Alternate Approach
hack and bug bounty
My Bug Bounty Journey & Ranking 15th in U.S…
Medium
My Bug Bounty Journey & Ranking 15th in U.S…
Hello,
hack and bug bounty
Cyber Awareness Month: Day 1 — Who requires Cyber Security?
Medium
Cyber Awareness Month: Day 1 — Who requires Cyber Security?
A common question by many people is that I do not work in the IT industry or related to computers through profession. And, is…
hack and bug bounty
$1000 Bug using simple Graphql Introspection query
Medium
$1000 Bug using simple Graphql Introspection query
Welcome to my blog! In this post, I will be discussing my experience in the security testing of an application’s implementation of…
hack and bug bounty
Exploring Web3 Bug Bounty Programs
Medium
Exploring Web3 Bug Bounty Programs
Creating a safe Web3 is like building a super strong castle, with each digital brick adding to the decentralized structure and keeping it…
hack and bug bounty
11 Tools For Mastering Ethical Hacking
Medium
11 Tools For Mastering Ethical Hacking
A Comprehensive Guide
hack and bug bounty
Intro to Syscalls & Windows internals for malware development Pt.1
Medium
Intro to Syscalls & Windows internals for malware development Pt.1
Hello Everyone, over the years I’ve written many articles/summaries that for some reason I kept to myself and didn’t think to share them…
hack and bug bounty
Gaining Admin Access via GraphQL
Medium
Gaining Admin Access via GraphQL
This is a simple story about chaining 2 vulnerabilities to gain access to an administrative website. I’m going to share the thought process…
hack and bug bounty
A Practical Playbook to Ethical Web Hacking— Contents Based on TryHackMe Jr Penetration Tester…
Medium
A Practical Playbook to Ethical Web Hacking— Contents Based on TryHackMe Jr Penetration Tester Learning Path
Hello cybersecurity learners and enthusiasts! If you are relatively new to ethical web hacking, this is a good starter guide for you. Here…
hack and bug bounty
The Importance of Gap Analysis in ISO/IEC 27001 Version Transition
Medium
The Importance of Gap Analysis in ISO/IEC 27001 Version Transition
What is ISO 27001 Gap Analysis?
hack and bug bounty
ISO/IEC 27001:2022 Version Transition
Medium
ISO/IEC 27001:2022 Version Transition
ISO/IEC 27001 Information Security Management System (ISMS) is the most effective way to provide managerial control over the information in…
hack and bug bounty
5+All Security Resource Digest for 2023–10–2
Medium
5+All Security Resource Digest for 2023–10–2
Here are my favorite 5 security resources added to my security resource database since yesterday. These resources will range from blogs and Reddit posts, through paid resource subscriptions and…
hack and bug bounty
Linux Privilege Escalation — Weak File Permission — /etc/passwd Writable
Medium
Linux Privilege Escalation — Weak File Permission — /etc/passwd Writable
The /etc/passwd file stores user account information for each user on the system. Each line in the file represents a single user accountf
hack and bug bounty
Find Processes with EnumProcesses
Medium
Find Processes with EnumProcesses
In the dynamic and ever-evolving landscape of cybersecurity, red teamers and malware developers find themselves at the forefront of…
hack and bug bounty
Best Ethical Hacking Tools For Secure Digital Marketing Services
Medium
Best Ethical Hacking Tools For Secure Digital Marketing Services
In today’s interconnected world, where businesses harness the internet’s power to engage with their audiences, cybersecurity stands as a paramount concern. The ever-evolving landscape of cyber…
hack and bug bounty
11.1 Lab: Exploiting XXE using external entities to retrieve files | 2023
Medium
11.1 Lab: Exploiting XXE using external entities to retrieve files | 2023
This lab has a “Check stock” feature that parses XML input and returns any unexpected values in the response. To solve the lab, inject an…
hack and bug bounty
Tips and Tricks for Effective SQL Injection Testing using SQLMap Tamper Scripts
Medium
Tips and Tricks for Effective SQL Injection Testing using SQLMap Tamper Scripts
Hello, in this post, I will be sharing information about SQLMap tamper scripts. So, what is SQLMap? What are tamper scripts in SQLMap? And…
hack and bug bounty
Nmap Commands Unveiled: Surfing the Cyber Seas!
⚓
Medium
🌐
Nmap Commands Unveiled: Surfing the Cyber Seas!
⚓
Ahoy, fellow cyber-surfers!
hack and bug bounty
Read Earth X Trilogy Omnibus: Omega by Steve Pugh,Doug Braithwaite,Steve Yeowell,Steve…
Medium
Read Earth X Trilogy Omnibus: Omega by Steve Pugh,Doug Braithwaite,Steve Yeowell,Steve…
Review Earth X Trilogy Omnibus Omega by Steve Pugh Doug Braithwaite Steve Yeowell Steve Sadowski Alex Ross Jim Krueger
hack and bug bounty
Download Spy x Family, Vol. 4 by Tatsuya Endo & Tatsuya Endo
Medium
Download Spy x Family, Vol. 4 by Tatsuya Endo & Tatsuya Endo
Review Spy x Family Vol by Tatsuya Endo Tatsuya Endo
hack and bug bounty
Read Mr X Stitch Guide to Cross Stitch, The by Jamie Chalmers
Medium
Read Mr X Stitch Guide to Cross Stitch, The by Jamie Chalmers
Review Mr X Stitch Guide to Cross Stitch The by Jamie Chalmers