hack and bug bounty
@hack_com
22
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
22 subscribers
hack and bug bounty
“Uncovering the Cryptojacking Epidemic” A Guide for Bug Bounty Hunters
Medium
“Uncovering the Cryptojacking Epidemic” A Guide for Bug Bounty Hunters
In the ever-evolving landscape of cybersecurity threats, a new menace has been steadily gaining ground — cryptojacking. This silent…
hack and bug bounty
nOAuth: Account Takeover via Microsoft Oauth
Medium
nOAuth: Account Takeover via Microsoft Oauth
Hi everyone, I want to share a cool and easy account takeover I recently found. I was able to perform a full account takeover via Sign In…
hack and bug bounty
Cyber Briefing: 2023.10.02
Medium
Cyber Briefing: 2023.10.02
👉
What’s happening in cybersecurity today?
hack and bug bounty
️ Unleash the Power of the Digital Vigilante: Your Arsenal of Scanning Tools!
Medium
🛡️
Unleash the Power of the Digital Vigilante: Your Arsenal of Scanning Tools!
💻
🔍
In the ever-expanding digital frontier, knowledge is power, and reconnaissance is the name of the game.
hack and bug bounty
CRTP — Certified Red Team Professional Review
Medium
CRTP — Certified Red Team Professional Review
Note that the Certified Red Team Professional (CRTP) course and labs are offered by Altered Security who are creators of the course and…
hack and bug bounty
Open Redirects in SPA’s and XSS-less payloads
Medium
Open Redirects in SPA’s and XSS-less payloads
Single Page Applications (SPAs) have revolutionized web development by providing seamless, responsive, and user-friendly experiences…
hack and bug bounty
IW Weekly #79: RCE in Google Chrome, CVE-2023–40044, OIDC misconfiguration to ATO, accessing…
Medium
👩💻
IW Weekly #79: RCE in Google Chrome, CVE-2023–40044, OIDC misconfiguration to ATO, accessing millions of call recordings and…
Infosec Weekly newsletter 79
👋
hack and bug bounty
How to install slither using python-venv to analyze smart contracts
Medium
How to install slither using python-venv to analyze smart contracts
Learn how to install slither and avoid dependencies conflicts.
hack and bug bounty
Twitter/X Spaces and Elon’s Opportunity for Real Free Speech
Medium
Twitter/X Spaces and Elon’s Opportunity for Real Free Speech
I’ve been marinating on this whole free speech thing, especially with Elon Musk flagging himself as a free speech absolutist.
hack and bug bounty
InfoSecSherpa’s News Roundup for Monday, October 2, 2023
Medium
InfoSecSherpa’s News Roundup for Monday, October 2, 2023
InfoSecSherpa: Your Guide Up a Mountain of Information!
hack and bug bounty
People, Not Just Technology: Addressing the Human Factor in Cybersecurity
Medium
People, Not Just Technology: Addressing the Human Factor in Cybersecurity
While technology plays a critical role in cybersecurity, the human factor is just as important. In fact, employee error and negligence are…
hack and bug bounty
“Penetration Testing: The Key to a Strong Cybersecurity Strategy”
Medium
“Penetration Testing: The Key to a Strong Cybersecurity Strategy”
The fundamental goal of penetration testing is to imitate real-world cyberattacks and exploit gaps in security before malevolent hackers…
hack and bug bounty
List of Scanning tools
Medium
List of Scanning tools
There are various scanning tools available for different purposes. Here's a list of some popular scanning tools:
hack and bug bounty
In a rapidly evolving digital sphere, where malicious threats loom large and unyielding…
Medium
In a rapidly evolving digital sphere, where malicious threats loom large and unyielding…
Identification and Assessment of Security Risks:
hack and bug bounty
TCM Security — Practical Ethical Hacking Course —Dev Walktrough
Medium
TCM Security — Practical Ethical Hacking Course —Dev Walktrough
I first did the classic way of Scanning & Enumeration that is ARP Scanning and NetDiscover :
hack and bug bounty
View PDF Lady Gaga X Terry Richardson by Lady Gaga & Terry Richardson
Medium
View PDF Lady Gaga X Terry Richardson by Lady Gaga & Terry Richardson
Review Lady Gaga X Terry Richardson by Lady Gaga Terry Richardson
hack and bug bounty
Setting Up Hacking Lab: Every beginner should know this VirtualBox network configurations
Medium
Setting Up Hacking Lab: Every beginner should know this VirtualBox network configurations
Hey neophyte hackers! As we know, everyone who started to learn about Cybersecurity, Ethical Hacking, Penetration Testing, first step to…
hack and bug bounty
Unveiling the Ultimate Arsenal:
Medium
🌟
Unveiling the Ultimate Arsenal:
🔍
The A-Z of Network Scanning Tools!
hack and bug bounty
9 Common Security Vulnerabilities in Web Applications
Medium
9 Common Security Vulnerabilities in Web Applications
Web applications have become integral to our daily lives, facilitating everything from online shopping to social interactions. However, the…
hack and bug bounty
Apply Ethical Principles in Bug Hunting
Medium
Apply Ethical Principles in Bug Hunting
Introduction
hack and bug bounty
Boost PowerShell Performance: Harness Ngen for Effortless Speed
Medium
Boost PowerShell Performance: Harness Ngen for Effortless Speed
“Boost PowerShell Performance: Harness Ngen for Effortless Speed” is published by SimeonOnSecurity.