hack and bug bounty
@hack_com
22
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
22 subscribers
hack and bug bounty
3 Reasons Why University Students Should begin to write on
Medium
3 Reasons Why University Students Should begin to write on 𝕏
Starting to write online when you’re studying at the university is the ideal time, if you want to use your writing skills as a possible…
hack and bug bounty
Execution of Arbitrary JavaScript in Android Application
Medium
Execution of Arbitrary JavaScript in Android Application
In this blog, we will learn about the possible ways to find cross-site scripting by abusing JavaScript in Android applications. Cross-site…
hack and bug bounty
XSS Steal Cookies
Medium
XSS Steal Cookies
Hello hackers, I’m Mostafa Elguerdawi, in this Write-up I’ll explain how I was able to steal users’ cookies via XSS.
hack and bug bounty
Day 5: The Role of Encryption in Data Protection — Why It Matters More Than Ever
Medium
Day 5: The Role of Encryption in Data Protection — Why It Matters More Than Ever
Welcome to Day 5 of Cybersecurity Awareness Month! Today, I delve into a critical aspect of cybersecurity: encryption. In an era where data…
hack and bug bounty
The use of AI in the creative industry
Medium
The use of AI in the creative industry
The use of AI in the creative industry has raised concerns about its potential negative consequences. These include a decline in the…
hack and bug bounty
5+All Security Resource Digest for 2023–10–5
Medium
5+All Security Resource Digest for 2023–10–5
Here are my favorite 5 security resources added to my security resource database since yesterday. These resources will range from blogs and Reddit posts, through paid resource subscriptions and…
hack and bug bounty
Shift Security Left -What Why How ???
Medium
Shift Security Left -What Why How ???
What is it ? And Why is it important?
In simple words, we are shifting or moving the Security aspect of any software (which is in…
hack and bug bounty
Understanding Web Application Penetration Testing
Medium
Understanding Web Application Penetration Testing
Web Application Penetration Testing is a structured approach to evaluating the security of web applications. It involves simulating…
hack and bug bounty
Hack The Box: Unveiling Ignition
Medium
Hack The Box: Unveiling Ignition
Starting Point — Tier 1 — Ignition Lab
hack and bug bounty
IoT Security: Challenges, Solutions, and Best Practices
Medium
IoT Security: Challenges, Solutions, and Best Practices
The Internet of Things (IoT) has transformed the way we interact with technology, from smart homes and wearable devices to industrial…
hack and bug bounty
TwitterX Links Less Relevant Like Most Social Networks
Medium
TwitterX Links Less Relevant Like Most Social Networks
So links push your content down in the algorithm on X. Isn’t that the same on LinkedIn and Facebook? Links rank less in the algorithm on…
hack and bug bounty
Secure Design Review
Medium
Secure Design Review
What is Secure Design Review ?
hack and bug bounty
Application Security Market Size, Share Estimation, Business Strategies, Opportunities And Forecast…
Medium
Application Security Market Size, Share Estimation, Business Strategies, Opportunities And Forecast…
The Application Security Global Market Report 2023, provides comprehensive information on the application security market across 60+…
hack and bug bounty
“RCE through Deserialization” How to Exploit Java and .NET Applications
Medium
“RCE through Deserialization” How to Exploit Java and .NET Applications
In the world of cybersecurity, Remote Code Execution (RCE) is one of the most critical vulnerabilities that an application can face. It…
hack and bug bounty
Unveiling ServerSleuth: A Web Server Information Disclosure Checker
Medium
Unveiling ServerSleuth: A Web Server Information Disclosure Checker
In the vast landscape of web security, understanding potential vulnerabilities is crucial. Server information disclosure is one such area…
hack and bug bounty
403 Forbidden? No Problem, Here’s a POST XSS
Medium
403 Forbidden? No Problem, Here’s a POST XSS
Greetings to all the brilliant minds in the hacking community! I go by the name Remmy, and I’d like to share my experience with a…
hack and bug bounty
12.1 Lab: Detecting NoSQL injection | 2023
Medium
12.1 Lab: Detecting NoSQL injection | 2023
The product category filter for this lab is powered by a MongoDB NoSQL database. It is vulnerable to NoSQL injection. To solve the lab…
hack and bug bounty
The One with the Hacked Credentials: From Emails to Admin Access.
Medium
The One with the Hacked Credentials: From Emails to Admin Access.
(An iCSI CTF Challenge)
hack and bug bounty
Has Elon Musk ever said anything that is absolutely not true?
Medium
Has Elon Musk ever said anything that is absolutely not true?
Alright, let’s cut the fluff and get straight to the point. Elon Musk, the real-life Tony Stark, has done some wild stuff. From launching…
hack and bug bounty
A vulnerability in the Facebook
Medium
A vulnerability in the Facebook
A vulnerability in the Facebook platform on the web version allows you to change the name with an unlimited number of attempts, and with…
hack and bug bounty
Cyber Briefing: 2023.10.05
Medium
Cyber Briefing: 2023.10.05
👉
What’s going on in the cyber world today?