hack and bug bounty
@hack_com
21
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
21 subscribers
hack and bug bounty
Ethical Hacking: How It Works
Medium
Ethical Hacking: How It Works
Ethical hacking, also known as white hat hacking, is the process of using hacking techniques to identify and exploit vulnerabilities in a…
hack and bug bounty
The SANS TOP 25
Medium
The SANS TOP 25
The SANS TOP 25 is a list of the most dangerous software errors that can lead to serious web security breaches. It is published annually by…
hack and bug bounty
Cybersecurity: The SANS TOP 25 Most Dangerous Software Errors
Medium
Cybersecurity: The SANS TOP 25 Most Dangerous Software Errors
The SANS TOP 25 Most Dangerous Software Errors is a vital resource for the cybersecurity community.
hack and bug bounty
Cyber Briefing: 2023.10.09
Medium
Cyber Briefing: 2023.10.09
👉
What’s happening in cybersecurity today?
hack and bug bounty
Demystifying Cybersecurity: CVE, CWE, and NVD
Medium
Demystifying Cybersecurity: CVE, CWE, and NVD
In today’s digital era, understanding cybersecurity is paramount! Let’s explore three key concepts: CVE (Common Vulnerabilities and…
hack and bug bounty
Ethical Hacking menggunakan Metasploit di Kali Linux
Medium
Ethical Hacking menggunakan Metasploit di Kali Linux
Tujuan dari dibuatnya artikel Ethical Hacking menggunakan Metasploit ini hanya untuk pelajaran supaya kita semua dapat lebih berhati-hati…
hack and bug bounty
Best Ways to Find XSS in Web App Penetration Testing
Medium
Best Ways to Find XSS in Web App Penetration Testing
Uncovering Cross-Site Scripting Vulnerabilities for Robust Security
hack and bug bounty
Uncovering Security Vulnerabilities: A Deep Dive into an Eye-Opening Git Discovery
Medium
Uncovering Security Vulnerabilities: A Deep Dive into an Eye-Opening Git Discovery
Introduction
hack and bug bounty
Understanding CVE, CWE, and NVD: Protecting the Digital World
Medium
Understanding CVE, CWE, and NVD: Protecting the Digital World
In the ever-evolving landscape of cybersecurity, staying informed about vulnerabilities and threats is crucial. Three key acronyms often…
hack and bug bounty
SANS TOP 25 THREATS
Medium
SANS TOP 25 THREATS
Here is the CWE Top 25 Most Dangerous Software Weaknesses :
hack and bug bounty
Perfect Loader Implementations
Medium
Perfect Loader Implementations
Thank you to SpecterOps for supporting this research and to Lee and Sarah for proofreading and editing! Crossposted on GitHub.
hack and bug bounty
Cybersecurity: Protecting Against 99% of Attacks — Insights from Microsoft’s 2023 Security Report
Medium
Cybersecurity: Protecting Against 99% of Attacks — Insights from Microsoft’s 2023 Security Report
In today’s ever-evolving digital landscape, cybersecurity stands as a paramount challenge. As technology leaders, it is our responsibility…
hack and bug bounty
A list of SANS TOP 25
Medium
A list of SANS TOP 25
🔍
Are you familiar with the SANS TOP 25? It’s a list of the most dangerous software vulnerabilities that can be exploited by attackers…
hack and bug bounty
What is CVE, CWE and NVD!
Medium
What is CVE, CWE and NVD!
🔒
Let’s Raise Cybersecurity Awareness!
🔒
hack and bug bounty
Understanding the SANS TOP 25: Prioritizing Cybersecurity Threats
Medium
Understanding the SANS TOP 25: Prioritizing Cybersecurity Threats
In the ever-evolving world of cybersecurity, identifying and mitigating threats is a top priority for organizations. To aid in this crucial…
hack and bug bounty
How to move your following from X to Threads (or anywhere)
Medium
How to move your following from X to Threads (or anywhere)
Thanks to recent breaking news misinformation drowning the network, and Musk’s ‘pay or further ‘enshitification’ until you do’ policy…
hack and bug bounty
Defending Against SIM Swap Attacks: How Cloaked Wireless Enhances Security
Medium
Defending Against SIM Swap Attacks: How Cloaked Wireless Enhances Security
In an increasingly interconnected world, mobile devices are an integral part of our daily lives. We use them for communication, work, and…
hack and bug bounty
How I Uncovered a Stored XSS in octenium.com
Medium
How I Uncovered a Stored XSS in octenium.com
Hey folks,
hack and bug bounty
Earn Money with Fun! Find Vulnerability in Random Sites
Medium
Earn Money with Fun! Find Vulnerability in Random Sites
This article I will tell you about how I make money from sites that do not have a Bug bounty program, because I think this is very…
hack and bug bounty
A Practical Guide to Google Dorking | Day13 of 30DaysOfOSINT
Medium
A Practical Guide to Google Dorking | Day13 of 30DaysOfOSINT
The main aim of writing this blog is to get you all familiar with basic google dorks and their use cases.
hack and bug bounty
SQL Injection on HTTP Headers: Live Hacking
Medium
SQL Injection on HTTP Headers: Live Hacking
Custom HTTP Header Exposed