hack and bug bounty
@hack_com
22
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
22 subscribers
hack and bug bounty
The elusive Satoshi
Medium
The elusive Satoshi
The inventor of Bitcoin signed his name under the pseudonym Satoshi Nakamoto. As far as is known, he has never had a Twitter profile, in…
hack and bug bounty
Cyber Briefing: 2023.10.04
Medium
Cyber Briefing: 2023.10.04
👉
What’s trending in cybersecurity today?
hack and bug bounty
A Practical Approach to SBOM in CI/CD Part III — Tracking SBOMs with Dependency-Track
Medium
A Practical Approach to SBOM in CI/CD Part III — Tracking SBOMs with Dependency-Track
Crucial part of utilising a full potential of Software Bill of Materials is automation. This article covers automated projects tracking…
hack and bug bounty
Unleash Uncompromising Security with Datalocker Sentry K350
Medium
Unleash Uncompromising Security with Datalocker Sentry K350
In today’s data-driven world, safeguarding your information is paramount, and the Datalocker Sentry K350 takes data protection to a whole…
hack and bug bounty
Day 4: Common Attack Vectors — How Cyberattacks Happen and How to Defend Against Them
Medium
Day 4: Common Attack Vectors — How Cyberattacks Happen and How to Defend Against Them
Welcome to Day 4 of Cybersecurity Awareness Month. I’ll embark on a journey through the fascinating world of cyber threats, uncovering…
hack and bug bounty
Hi everyone,
Medium
Hi everyone,
and welcome to my new blog on XSS! My name is Agape, and I’m a passionate cybersecurity researcher with a special interest in web security…
hack and bug bounty
Knocking the CIS: Betray the motherland at home
Medium
Knocking the CIS: betray the motherland at home
Some users of the Internet have chosen to earn a wage delivering malware to other users, infecting machines all over the world. This is nothing new, it happened in the past and it will be the same in…
hack and bug bounty
2.4.3 Quiz — Planning and Scoping a Penetration Testing Assessment
Medium
2.4.3 Quiz — Planning and Scoping a Penetration Testing Assessment
This is a write up for the Second quiz you will encounter on Cisco’s Ethical Hacker course, please attempt to study the given material…
hack and bug bounty
Critical SQL Injection Vulnerability in Login Page CVE-2023–44970
Medium
Critical SQL Injection Vulnerability in Login Page CVE-2023–44970
hack and bug bounty
TryHackMe-Pickle Rick(WriteUp)
Medium
TryHackMe-Pickle Rick(WriteUp)
Hello lovely people! I hope you are all doing great. Another one in the writeups list after so long. I hope you’ll enjoy this one too.
hack and bug bounty
InfoSecSherpa’s News Roundup for Wednesday, October 4, 2023
Medium
InfoSecSherpa’s News Roundup for Wednesday, October 4, 2023
InfoSecSherpa: Your Guide Up a Mountain of Information!
hack and bug bounty
Android static code analysis
Medium
Android static code analysis
بسم الله الرحمن الرحيم
in the name of allah the Most Gracious, Most Merciful
hack and bug bounty
HeartBleed Writeup
Medium
HeartBleed Writeup
Written by Substing for the TryHackMe room.
Room can be found here.
hack and bug bounty
Exploring the Depths: Metasploit Framework Structure Unveiled
Medium
Exploring the Depths: Metasploit Framework Structure Unveiled
Introduction
hack and bug bounty
Mastering Metasploit: A Beginner’s Guide to msfconsole Basic Commands
Medium
Mastering Metasploit: A Beginner’s Guide to msfconsole Basic Commands
Introduction
hack and bug bounty
From to Medium — 10 Reasons I’m Starting to Write on Medium
Medium
From 𝕏 to Medium — 10 Reasons I’m Starting to Write on Medium
I’ve been writing on 𝕏 for more than a month and now I’ve decided to expand to Medium. Here are 10 reasons why I made this decision.
hack and bug bounty
How To Hack Wi-Fi Password Using Hashcat.
Medium
How To Hack Wi-Fi Password Using Hashcat.
In this guide, you will learn how to crack WiFi passwords using Hashcat. Hashcat is a powerful password recovery tool that can help you recover lost or forgotten passwords for a variety of platforms…
hack and bug bounty
Chocolate Factory CTF Writeup
Medium
Chocolate Factory CTF Writeup
This documents my adventures in TryHackMe’s Chocolate Factory room, which can be found here.
hack and bug bounty
Browser Extensions for Fun and Profit @ Texas Cyber Summit | USA
Medium
Browser Extensions for Fun and Profit @ Texas Cyber Summit | USA
Conducting our browser security workshop in Texas, USA
hack and bug bounty
Advantages of Ethical Hacking: Strengthening Cybersecurity
Medium
Advantages of Ethical Hacking: Strengthening Cybersecurity
In today’s digitally driven world, the importance of cybersecurity cannot be overstated. As technology advances, so do the methods employed…
hack and bug bounty
Step by Step Walking An Application Walkthrough
Medium
Step by Step Walking An Application Walkthrough
In this room, we will discover the art of personally inspecting a web application for security concerns using the tools already built into…