hack and bug bounty
@hack_com
22
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
22 subscribers
hack and bug bounty
Hilarious Cybersecurity Myths: Laughing at Hollywood’s Hacking Fantasies
Medium
Hilarious Cybersecurity Myths: Laughing at Hollywood’s Hacking Fantasies
“Hilarious Cybersecurity Myths: Laughing at Hollywood’s Hacking Fantasies” is published by SimeonOnSecurity.
hack and bug bounty
Top Cybersecurity Movies — Thrilling Tales of Digital Defenders
Medium
Top Cybersecurity Movies — Thrilling Tales of Digital Defenders
“Top Cybersecurity Movies — Thrilling Tales of Digital Defenders” is published by SimeonOnSecurity.
hack and bug bounty
Exploring the Best Cybersecurity Memes and Pop Culture References
Medium
Exploring the Best Cybersecurity Memes and Pop Culture References
“Exploring the Best Cybersecurity Memes and Pop Culture References” is published by SimeonOnSecurity.
hack and bug bounty
Demystifying Cybersecurity Jargon: Your Guide to Digital Defense
Medium
Demystifying Cybersecurity Jargon: Your Guide to Digital Defense
Phishing”> Phishing attacks involve tricking individuals into divulging sensitive information or downloading malicious files. Cybercriminals often impersonate trustworthy entities, such as banks or…
hack and bug bounty
Effortless Custom Ethernet Cable Creation Guide | DIY Network Solutions
Medium
Effortless Custom Ethernet Cable Creation Guide | DIY Network Solutions
When creating custom Ethernet cables, it’s essential to choose the right type of wiring that aligns with your specific application and environmental conditions. Consider factors like flexibility…
hack and bug bounty
Effective Port Scanning with Nmap
Medium
Effective Port Scanning with Nmap
When it comes to hacking, knowledge is power. The more knowledge you have about a target system or network, the more options you have…
hack and bug bounty
Navigating the Dark Web: A Closer Look at the Hidden Internet
Medium
Navigating the Dark Web: A Closer Look at the Hidden Internet
The Dark Web is a mysterious and often misunderstood corner of the internet that has captured the imaginations of many. Portrayed in movies…
hack and bug bounty
Multiple Organization Full account Take-over via privilege escalation
Medium
Multiple Organization Full account Take-over via privilege escalation
A High severity security flaw in the organization’s web application allows an attacker to takeover user accounts, including high-privileged…
hack and bug bounty
10 Essential Security Tips for a Secure eCommerce Website
Medium
10 Essential Security Tips for a Secure eCommerce Website
Safeguard your online store with Cyber Suraksa’s Penetration Testing. Ensure a secure shopping experience for your customers.
hack and bug bounty
Demystifying SDR Hacking: A Deep Dive into Wireless Protocols Part:3
Medium
Demystifying SDR Hacking: A Deep Dive into Wireless Protocols Part:3
Aircraft Communication
hack and bug bounty
HackerOne: The Vulnerabilities Final Response and Ethical Hacker’s Plight
Medium
HackerOne: The Vulnerabilities Final Response and Ethical Hacker’s Plight
Do as I say or b
hack and bug bounty
P1 XSS?
Medium
P1 XSS?
Hello to all you curious hackers. It’s been two weeks since I discovered this vulnerability, and ever since, I’ve been planning to write…
hack and bug bounty
Mobile Application Security Course in Delhi
Medium
Mobile Application Security Course in Delhi
In today’s interconnected digital world, mobile application security is of paramount importance. As the number of mobile users continues to…
hack and bug bounty
Kali vs Parrot vs Athena: A Comparative Analysis
Medium
Kali vs Parrot vs Athena: A Comparative Analysis
Introduction
hack and bug bounty
হ্যাকবার কি?
Medium
🛑
হ্যাকবার কি?
🛑
✅
হ্যাকবার ফায়ারফক্সে / cyberfox browser এর একটি এক্সটেনশন/টুল। এই টুলটি Cyber Sucurity Expert দের জন্য খুবই উপযোগী/সহায়ক।
hack and bug bounty
Email HTML Injection? How I did it
Medium
Email HTML Injection? How I did it
It’s been a while and I have been very busy with bug finds so I’ll be going over a few in the next few hours of what I found and how I…
hack and bug bounty
Exploring XXE Vulnerabilities in GraphQL APIs
Medium
Exploring XXE Vulnerabilities in GraphQL APIs
GraphQL is a query language and runtime for APIs that allows developers to request and receive the exact data they need. It is a popular…
hack and bug bounty
5+All Security Resource Digest for 2023–10–7
Medium
5+All Security Resource Digest for 2023–10–7
Here are my favorite 5 security resources added to my security resource database since yesterday. These resources will range from blogs and Reddit posts, through paid resource subscriptions and…
hack and bug bounty
Cross-Site Scripting (XSS) in Web App Penetration Testing | 2023
Medium
Cross-Site Scripting (XSS) in Web App Penetration Testing | 2023
In this section, we’ll explain what XSS is, describe some common examples, explain how to find and exploit various kinds of XSS, and…
hack and bug bounty
Zero to OSCP
Medium
Zero to OSCP
The start of a long journey to professional pen testing.
hack and bug bounty
The case of FreshWorks and Prometheus — A HackerOne program
Medium
The case of FreshWorks and Prometheus — A HackerOne program
A ‘Not a Vulnerability report just an unusual find’ — Freshworks and Freshchat