hack and bug bounty
@hack_com
22
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
22 subscribers
hack and bug bounty
What is Ethical Hacking? Types of Hacking and Career Potential
Medium
What is Ethical Hacking? Types of Hacking and Career Potential
In the previous two decades, technology has advanced quickly, giving rise to innovations and tools leading to transformations. While…
hack and bug bounty
What are the Most In-Demand Cybersecurity Skills
Medium
What are the Most In-Demand Cybersecurity Skills
The most in-demand cybersecurity skills in 2023 are:
hack and bug bounty
NoSQL in Web App Penetration Testing by Portswigger | 2023
Medium
NoSQL in Web App Penetration Testing by Portswigger | 2023
In this section, we’ll explain what NoSQL is, describe some common examples, explain how to find and exploit various kinds of NoSQL, and…
hack and bug bounty
Network Basics for Ethical Hackers
Medium
Network Basics for Ethical Hackers
Introduction
hack and bug bounty
Navigating the Digital Battlefield: Stages of a Penetration Test
Medium
Navigating the Digital Battlefield: Stages of a Penetration Test
Introduction:
hack and bug bounty
Hack The Box Lab: Unveiling Bike
Medium
Hack The Box Lab: Unveiling Bike
Starting Point — Tier 1— Bike Lab
hack and bug bounty
Mastering Basic Linux Commands for Ethical Hackers: A Comprehensive Guide
Medium
Mastering Basic Linux Commands for Ethical Hackers: A Comprehensive Guide
Introduction
hack and bug bounty
X.com: How I Reached 1 MILLION Impressions In A Single Day!
Medium
X.com: How I Reached 1 MILLION Impressions In A Single Day!
Success, But Is It Ephemeral?
hack and bug bounty
The elusive Satoshi
Medium
The elusive Satoshi
The inventor of Bitcoin signed his name under the pseudonym Satoshi Nakamoto. As far as is known, he has never had a Twitter profile, in…
hack and bug bounty
Cyber Briefing: 2023.10.04
Medium
Cyber Briefing: 2023.10.04
👉
What’s trending in cybersecurity today?
hack and bug bounty
A Practical Approach to SBOM in CI/CD Part III — Tracking SBOMs with Dependency-Track
Medium
A Practical Approach to SBOM in CI/CD Part III — Tracking SBOMs with Dependency-Track
Crucial part of utilising a full potential of Software Bill of Materials is automation. This article covers automated projects tracking…
hack and bug bounty
Unleash Uncompromising Security with Datalocker Sentry K350
Medium
Unleash Uncompromising Security with Datalocker Sentry K350
In today’s data-driven world, safeguarding your information is paramount, and the Datalocker Sentry K350 takes data protection to a whole…
hack and bug bounty
Day 4: Common Attack Vectors — How Cyberattacks Happen and How to Defend Against Them
Medium
Day 4: Common Attack Vectors — How Cyberattacks Happen and How to Defend Against Them
Welcome to Day 4 of Cybersecurity Awareness Month. I’ll embark on a journey through the fascinating world of cyber threats, uncovering…
hack and bug bounty
Hi everyone,
Medium
Hi everyone,
and welcome to my new blog on XSS! My name is Agape, and I’m a passionate cybersecurity researcher with a special interest in web security…
hack and bug bounty
Knocking the CIS: Betray the motherland at home
Medium
Knocking the CIS: betray the motherland at home
Some users of the Internet have chosen to earn a wage delivering malware to other users, infecting machines all over the world. This is nothing new, it happened in the past and it will be the same in…
hack and bug bounty
2.4.3 Quiz — Planning and Scoping a Penetration Testing Assessment
Medium
2.4.3 Quiz — Planning and Scoping a Penetration Testing Assessment
This is a write up for the Second quiz you will encounter on Cisco’s Ethical Hacker course, please attempt to study the given material…
hack and bug bounty
Critical SQL Injection Vulnerability in Login Page CVE-2023–44970
Medium
Critical SQL Injection Vulnerability in Login Page CVE-2023–44970
hack and bug bounty
TryHackMe-Pickle Rick(WriteUp)
Medium
TryHackMe-Pickle Rick(WriteUp)
Hello lovely people! I hope you are all doing great. Another one in the writeups list after so long. I hope you’ll enjoy this one too.
hack and bug bounty
InfoSecSherpa’s News Roundup for Wednesday, October 4, 2023
Medium
InfoSecSherpa’s News Roundup for Wednesday, October 4, 2023
InfoSecSherpa: Your Guide Up a Mountain of Information!
hack and bug bounty
Android static code analysis
Medium
Android static code analysis
بسم الله الرحمن الرحيم
in the name of allah the Most Gracious, Most Merciful
hack and bug bounty
HeartBleed Writeup
Medium
HeartBleed Writeup
Written by Substing for the TryHackMe room.
Room can be found here.