hack and bug bounty
@hack_com
22
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
22 subscribers
hack and bug bounty
Google Dorking can reward us $$$$
Medium
Google Dorking can reward us $$$$
“Google Dorking,” a practice that utilizes advanced search operators to pinpoint hidden or confidential information on the web. In this…
hack and bug bounty
“XXE in Office Documents” A Lesser-Known Attack Vector
Medium
“XXE in Office Documents” A Lesser-Known Attack Vector
When we think about cybersecurity threats, our minds often jump to familiar scenarios like phishing emails, malware-infected downloads, or…
hack and bug bounty
“XXE in Mobile Applications” Finding the Needle in the Haystack
Medium
“XXE in Mobile Applications” Finding the Needle in the Haystack
In an era dominated by mobile technology, our smartphones have become extensions of ourselves, serving as personal assistants…
hack and bug bounty
Cyber Briefing: 2023.10.06
Medium
Cyber Briefing: 2023.10.06
👉
What are the latest cybersecurity alerts, incidents, and news?
hack and bug bounty
JellyPwn
Medium
JellyPwn
RCE/Reverse Shell through installing Jellyfin plugins
hack and bug bounty
Hacking: Myth vs Reality
Medium
Hacking: Myth vs Reality
Hacking, a term that has become synonymous with cybercrime and clandestine activities, is a concept shrouded in misconceptions. The popular…
hack and bug bounty
InfoSecSherpa’s News Roundup for Friday, October 6, 2023
Medium
InfoSecSherpa’s News Roundup for Friday, October 6, 2023
InfoSecSherpa: Your Guide Up a Mountain of Information!
hack and bug bounty
Enhancing Code Security with DevSecOps: Part 1 — Connecting Git with AWS CodeCommit
Medium
Enhancing Code Security with DevSecOps: Part 1 — Connecting Git with AWS CodeCommit
Hello, everyone! I’m excited to take this journey with you and walk you through the steps to enhance the security of your code throughout…
hack and bug bounty
Reflected Cross-Site Scripting in Hidden Input Fields
Medium
Reflected Cross-Site Scripting in Hidden Input Fields
About XSS?
Cross-Site Scripting is a type of vulnerability that allows an attacker to inject JavaScript code into an application, deceiving the application into treating it as legitimate code. This…
hack and bug bounty
Qradar101 Blue Team Challenge
Medium
Qradar101 Blue Team Challenge
Category: Threat Hunting
hack and bug bounty
A Beginner’s Guide to AJP Proxy: Bridging Apache and Tomcat
Medium
A Beginner’s Guide to AJP Proxy: Bridging Apache and Tomcat
Introduction
hack and bug bounty
The Kitchen Sink of Cybersecurity Roles
Medium
The Kitchen Sink of Cybersecurity Roles
750,000+ cybersecurity jobs are unfilled. Are you trying to get your foot in the door?
hack and bug bounty
Understanding the 5 phases of ethical hacking
Medium
Understanding the 5 phases of ethical hacking
Ethical hacking plays a crucial role in enhancing the security of networks and systems. Let’s dive into the five fundamental phases:
hack and bug bounty
Understanding UAC in Windows Systems: Token Security and Beyond
Medium
Understanding UAC in Windows Systems: Token Security and Beyond
In today’s evolving cyber world, User Account Control (UAC) has emerged as one of the core mechanisms used by Windows systems to protect…
hack and bug bounty
IP Spoofing, in a Cinematic way
Medium
IP Spoofing, in a Cinematic way
In the dimly lit streets of the digital arena, where neon lines of code crisscrossed the virtual landscape, there exists a technique that…
hack and bug bounty
HTB: Starting Point — Redeemer Machine
Medium
HTB: Starting Point — Redeemer Machine
Penetration Test Report
hack and bug bounty
Mastering Google Dorks: Unleash Effortless Search Power
Medium
Mastering Google Dorks: Unleash Effortless Search Power
“Mastering Google Dorks: Unleash Effortless Search Power” is published by SimeonOnSecurity.
hack and bug bounty
Mastering Google Dorks: Unleash Effortless OSINT and Hacking Power
Medium
Mastering Google Dorks: Unleash Effortless OSINT and Hacking Power
“Mastering Google Dorks: Unleash Effortless OSINT and Hacking Power” is published by SimeonOnSecurity.
hack and bug bounty
Ultimate IT Toolkit: Boost Efficiency with Essential Tools & Gadgets
Medium
Ultimate IT Toolkit: Boost Efficiency with Essential Tools & Gadgets
In addition to software, IT professionals need reliable hardware to perform their tasks efficiently. Here are some hardware essentials: A powerful laptop is an IT professional’s best companion…
hack and bug bounty
Hilarious Cybersecurity Myths: Laughing at Hollywood’s Hacking Fantasies
Medium
Hilarious Cybersecurity Myths: Laughing at Hollywood’s Hacking Fantasies
“Hilarious Cybersecurity Myths: Laughing at Hollywood’s Hacking Fantasies” is published by SimeonOnSecurity.
hack and bug bounty
Top Cybersecurity Movies — Thrilling Tales of Digital Defenders
Medium
Top Cybersecurity Movies — Thrilling Tales of Digital Defenders
“Top Cybersecurity Movies — Thrilling Tales of Digital Defenders” is published by SimeonOnSecurity.