hack and bug bounty
@hack_com
22
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
22 subscribers
hack and bug bounty
Chocolate Factory CTF Writeup
Medium
Chocolate Factory CTF Writeup
This documents my adventures in TryHackMe’s Chocolate Factory room, which can be found here.
hack and bug bounty
Browser Extensions for Fun and Profit @ Texas Cyber Summit | USA
Medium
Browser Extensions for Fun and Profit @ Texas Cyber Summit | USA
Conducting our browser security workshop in Texas, USA
hack and bug bounty
Advantages of Ethical Hacking: Strengthening Cybersecurity
Medium
Advantages of Ethical Hacking: Strengthening Cybersecurity
In today’s digitally driven world, the importance of cybersecurity cannot be overstated. As technology advances, so do the methods employed…
hack and bug bounty
Step by Step Walking An Application Walkthrough
Medium
Step by Step Walking An Application Walkthrough
In this room, we will discover the art of personally inspecting a web application for security concerns using the tools already built into…
hack and bug bounty
“RCE in IoT Devices” Identifying and Exploiting Vulnerabilities
Medium
“RCE in IoT Devices” Identifying and Exploiting Vulnerabilities
The Internet of Things (IoT) has revolutionized our world, connecting everything from smart thermostats to industrial machinery to the…
hack and bug bounty
Exploiting Open Redirects in OAuth 2.0: A Case Study
Medium
Exploiting Open Redirects in OAuth 2.0: A Case Study
OAuth 2.0 is a widely adopted protocol for granting third-party applications limited access to a user’s protected resources. It’s the…
hack and bug bounty
Bypassing Open Redirect Mitigations: A Hunter’s Perspective
Medium
Bypassing Open Redirect Mitigations: A Hunter’s Perspective
Open redirects have long been a favorite target for attackers seeking to compromise user security and privacy. These vulnerabilities allow…
hack and bug bounty
“Ethical Hacking: Securing the Digital Frontier”
Medium
“Ethical Hacking: Securing the Digital Frontier”
In today’s interconnected world, cybersecurity is of paramount importance. This online ethical hacking course is designed to equip you with…
hack and bug bounty
Mastering Network Control with the ‘nc’ Command in Ethical Hacking
Medium
Mastering Network Control with the ‘nc’ Command in Ethical Hacking
Introduction
hack and bug bounty
3 Reasons Why University Students Should begin to write on
Medium
3 Reasons Why University Students Should begin to write on 𝕏
Starting to write online when you’re studying at the university is the ideal time, if you want to use your writing skills as a possible…
hack and bug bounty
Execution of Arbitrary JavaScript in Android Application
Medium
Execution of Arbitrary JavaScript in Android Application
In this blog, we will learn about the possible ways to find cross-site scripting by abusing JavaScript in Android applications. Cross-site…
hack and bug bounty
XSS Steal Cookies
Medium
XSS Steal Cookies
Hello hackers, I’m Mostafa Elguerdawi, in this Write-up I’ll explain how I was able to steal users’ cookies via XSS.
hack and bug bounty
Day 5: The Role of Encryption in Data Protection — Why It Matters More Than Ever
Medium
Day 5: The Role of Encryption in Data Protection — Why It Matters More Than Ever
Welcome to Day 5 of Cybersecurity Awareness Month! Today, I delve into a critical aspect of cybersecurity: encryption. In an era where data…
hack and bug bounty
The use of AI in the creative industry
Medium
The use of AI in the creative industry
The use of AI in the creative industry has raised concerns about its potential negative consequences. These include a decline in the…
hack and bug bounty
5+All Security Resource Digest for 2023–10–5
Medium
5+All Security Resource Digest for 2023–10–5
Here are my favorite 5 security resources added to my security resource database since yesterday. These resources will range from blogs and Reddit posts, through paid resource subscriptions and…
hack and bug bounty
Shift Security Left -What Why How ???
Medium
Shift Security Left -What Why How ???
What is it ? And Why is it important?
In simple words, we are shifting or moving the Security aspect of any software (which is in…
hack and bug bounty
Understanding Web Application Penetration Testing
Medium
Understanding Web Application Penetration Testing
Web Application Penetration Testing is a structured approach to evaluating the security of web applications. It involves simulating…
hack and bug bounty
Hack The Box: Unveiling Ignition
Medium
Hack The Box: Unveiling Ignition
Starting Point — Tier 1 — Ignition Lab
hack and bug bounty
IoT Security: Challenges, Solutions, and Best Practices
Medium
IoT Security: Challenges, Solutions, and Best Practices
The Internet of Things (IoT) has transformed the way we interact with technology, from smart homes and wearable devices to industrial…
hack and bug bounty
TwitterX Links Less Relevant Like Most Social Networks
Medium
TwitterX Links Less Relevant Like Most Social Networks
So links push your content down in the algorithm on X. Isn’t that the same on LinkedIn and Facebook? Links rank less in the algorithm on…
hack and bug bounty
Secure Design Review
Medium
Secure Design Review
What is Secure Design Review ?