hack and bug bounty
@hack_com
22
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
22 subscribers
hack and bug bounty
Download Spy x Family, Vol. 4 by Tatsuya Endo & Tatsuya Endo
Medium
Download Spy x Family, Vol. 4 by Tatsuya Endo & Tatsuya Endo
Review Spy x Family Vol by Tatsuya Endo Tatsuya Endo
hack and bug bounty
Read Mr X Stitch Guide to Cross Stitch, The by Jamie Chalmers
Medium
Read Mr X Stitch Guide to Cross Stitch, The by Jamie Chalmers
Review Mr X Stitch Guide to Cross Stitch The by Jamie Chalmers
hack and bug bounty
Open Redirects in IoT Devices: A Look into the Future
Medium
Open Redirects in IoT Devices: A Look into the Future
The Internet of Things (IoT) has ushered in an era of unprecedented connectivity, where everyday objects are becoming smart and…
hack and bug bounty
The Art of Social Engineering in Crypto Attacks
Medium
The Art of Social Engineering in Crypto Attacks
The world of cryptocurrency has witnessed remarkable growth over the past decade, with millions of people investing in and trading digital…
hack and bug bounty
“Uncovering the Cryptojacking Epidemic” A Guide for Bug Bounty Hunters
Medium
“Uncovering the Cryptojacking Epidemic” A Guide for Bug Bounty Hunters
In the ever-evolving landscape of cybersecurity threats, a new menace has been steadily gaining ground — cryptojacking. This silent…
hack and bug bounty
nOAuth: Account Takeover via Microsoft Oauth
Medium
nOAuth: Account Takeover via Microsoft Oauth
Hi everyone, I want to share a cool and easy account takeover I recently found. I was able to perform a full account takeover via Sign In…
hack and bug bounty
Cyber Briefing: 2023.10.02
Medium
Cyber Briefing: 2023.10.02
👉
What’s happening in cybersecurity today?
hack and bug bounty
️ Unleash the Power of the Digital Vigilante: Your Arsenal of Scanning Tools!
Medium
🛡️
Unleash the Power of the Digital Vigilante: Your Arsenal of Scanning Tools!
💻
🔍
In the ever-expanding digital frontier, knowledge is power, and reconnaissance is the name of the game.
hack and bug bounty
CRTP — Certified Red Team Professional Review
Medium
CRTP — Certified Red Team Professional Review
Note that the Certified Red Team Professional (CRTP) course and labs are offered by Altered Security who are creators of the course and…
hack and bug bounty
Open Redirects in SPA’s and XSS-less payloads
Medium
Open Redirects in SPA’s and XSS-less payloads
Single Page Applications (SPAs) have revolutionized web development by providing seamless, responsive, and user-friendly experiences…
hack and bug bounty
IW Weekly #79: RCE in Google Chrome, CVE-2023–40044, OIDC misconfiguration to ATO, accessing…
Medium
👩💻
IW Weekly #79: RCE in Google Chrome, CVE-2023–40044, OIDC misconfiguration to ATO, accessing millions of call recordings and…
Infosec Weekly newsletter 79
👋
hack and bug bounty
How to install slither using python-venv to analyze smart contracts
Medium
How to install slither using python-venv to analyze smart contracts
Learn how to install slither and avoid dependencies conflicts.
hack and bug bounty
Twitter/X Spaces and Elon’s Opportunity for Real Free Speech
Medium
Twitter/X Spaces and Elon’s Opportunity for Real Free Speech
I’ve been marinating on this whole free speech thing, especially with Elon Musk flagging himself as a free speech absolutist.
hack and bug bounty
InfoSecSherpa’s News Roundup for Monday, October 2, 2023
Medium
InfoSecSherpa’s News Roundup for Monday, October 2, 2023
InfoSecSherpa: Your Guide Up a Mountain of Information!
hack and bug bounty
People, Not Just Technology: Addressing the Human Factor in Cybersecurity
Medium
People, Not Just Technology: Addressing the Human Factor in Cybersecurity
While technology plays a critical role in cybersecurity, the human factor is just as important. In fact, employee error and negligence are…
hack and bug bounty
“Penetration Testing: The Key to a Strong Cybersecurity Strategy”
Medium
“Penetration Testing: The Key to a Strong Cybersecurity Strategy”
The fundamental goal of penetration testing is to imitate real-world cyberattacks and exploit gaps in security before malevolent hackers…
hack and bug bounty
List of Scanning tools
Medium
List of Scanning tools
There are various scanning tools available for different purposes. Here's a list of some popular scanning tools:
hack and bug bounty
In a rapidly evolving digital sphere, where malicious threats loom large and unyielding…
Medium
In a rapidly evolving digital sphere, where malicious threats loom large and unyielding…
Identification and Assessment of Security Risks:
hack and bug bounty
TCM Security — Practical Ethical Hacking Course —Dev Walktrough
Medium
TCM Security — Practical Ethical Hacking Course —Dev Walktrough
I first did the classic way of Scanning & Enumeration that is ARP Scanning and NetDiscover :
hack and bug bounty
View PDF Lady Gaga X Terry Richardson by Lady Gaga & Terry Richardson
Medium
View PDF Lady Gaga X Terry Richardson by Lady Gaga & Terry Richardson
Review Lady Gaga X Terry Richardson by Lady Gaga Terry Richardson
hack and bug bounty
Setting Up Hacking Lab: Every beginner should know this VirtualBox network configurations
Medium
Setting Up Hacking Lab: Every beginner should know this VirtualBox network configurations
Hey neophyte hackers! As we know, everyone who started to learn about Cybersecurity, Ethical Hacking, Penetration Testing, first step to…