hack and bug bounty
@hack_com
21
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
21 subscribers
hack and bug bounty
The SANS TOP 25
Medium
The SANS TOP 25
The SANS TOP 25 is a list of the most dangerous software errors that can lead to serious web security breaches. It is published annually byβ¦
hack and bug bounty
Cybersecurity: The SANS TOP 25 Most Dangerous Software Errors
Medium
Cybersecurity: The SANS TOP 25 Most Dangerous Software Errors
The SANS TOP 25 Most Dangerous Software Errors is a vital resource for the cybersecurity community.
hack and bug bounty
Cyber Briefing: 2023.10.09
Medium
Cyber Briefing: 2023.10.09
π
Whatβs happening in cybersecurity today?
hack and bug bounty
Demystifying Cybersecurity: CVE, CWE, and NVD
Medium
Demystifying Cybersecurity: CVE, CWE, and NVD
In todayβs digital era, understanding cybersecurity is paramount! Letβs explore three key concepts: CVE (Common Vulnerabilities andβ¦
hack and bug bounty
Ethical Hacking menggunakan Metasploit di Kali Linux
Medium
Ethical Hacking menggunakan Metasploit di Kali Linux
Tujuan dari dibuatnya artikel Ethical Hacking menggunakan Metasploit ini hanya untuk pelajaran supaya kita semua dapat lebih berhati-hatiβ¦
hack and bug bounty
Best Ways to Find XSS in Web App Penetration Testing
Medium
Best Ways to Find XSS in Web App Penetration Testing
Uncovering Cross-Site Scripting Vulnerabilities for Robust Security
hack and bug bounty
Uncovering Security Vulnerabilities: A Deep Dive into an Eye-Opening Git Discovery
Medium
Uncovering Security Vulnerabilities: A Deep Dive into an Eye-Opening Git Discovery
Introduction
hack and bug bounty
Understanding CVE, CWE, and NVD: Protecting the Digital World
Medium
Understanding CVE, CWE, and NVD: Protecting the Digital World
In the ever-evolving landscape of cybersecurity, staying informed about vulnerabilities and threats is crucial. Three key acronyms oftenβ¦
hack and bug bounty
SANS TOP 25 THREATS
Medium
SANS TOP 25 THREATS
Here is the CWE Top 25 Most Dangerous Software Weaknesses :
hack and bug bounty
Perfect Loader Implementations
Medium
Perfect Loader Implementations
Thank you to SpecterOps for supporting this research and to Lee and Sarah for proofreading and editing! Crossposted on GitHub.
hack and bug bounty
Cybersecurity: Protecting Against 99% of AttacksβββInsights from Microsoftβs 2023 Security Report
Medium
Cybersecurity: Protecting Against 99% of Attacks β Insights from Microsoftβs 2023 Security Report
In todayβs ever-evolving digital landscape, cybersecurity stands as a paramount challenge. As technology leaders, it is our responsibilityβ¦
hack and bug bounty
A list of SANS TOP 25
Medium
A list of SANS TOP 25
π
Are you familiar with the SANS TOP 25? Itβs a list of the most dangerous software vulnerabilities that can be exploited by attackersβ¦
hack and bug bounty
What is CVE, CWE and NVD!
Medium
What is CVE, CWE and NVD!
π
Letβs Raise Cybersecurity Awareness!
π
hack and bug bounty
Understanding the SANS TOP 25: Prioritizing Cybersecurity Threats
Medium
Understanding the SANS TOP 25: Prioritizing Cybersecurity Threats
In the ever-evolving world of cybersecurity, identifying and mitigating threats is a top priority for organizations. To aid in this crucialβ¦
hack and bug bounty
How to move your following from X to Threads (or anywhere)
Medium
How to move your following from X to Threads (or anywhere)
Thanks to recent breaking news misinformation drowning the network, and Muskβs βpay or further βenshitificationβ until you doβ policyβ¦
hack and bug bounty
Defending Against SIM Swap Attacks: How Cloaked Wireless Enhances Security
Medium
Defending Against SIM Swap Attacks: How Cloaked Wireless Enhances Security
In an increasingly interconnected world, mobile devices are an integral part of our daily lives. We use them for communication, work, andβ¦
hack and bug bounty
How I Uncovered a Stored XSS in octenium.com
Medium
How I Uncovered a Stored XSS in octenium.com
Hey folks,
hack and bug bounty
Earn Money with Fun! Find Vulnerability in Random Sites
Medium
Earn Money with Fun! Find Vulnerability in Random Sites
This article I will tell you about how I make money from sites that do not have a Bug bounty program, because I think this is veryβ¦
hack and bug bounty
A Practical Guide to Google Dorking | Day13 of 30DaysOfOSINT
Medium
A Practical Guide to Google Dorking | Day13 of 30DaysOfOSINT
The main aim of writing this blog is to get you all familiar with basic google dorks and their use cases.
hack and bug bounty
SQL Injection on HTTP Headers: Live Hacking
Medium
SQL Injection on HTTP Headers: Live Hacking
Custom HTTP Header Exposed
hack and bug bounty
β
- β¦
Medium
β
π° π£πππ-πππππ ππππππ πππππ πππππππππ ππβ¦
β
π° π£πππ-πππππ ππππππ πππππ πππππππππ ππ πππππππππππππππ ππ πππππ πππ ππ πππππ’ πππ ππ ππππππ π ππππππ ππππ πππππππππππ. π±π’ ππ‘ππππππππ ππππ πππππππππππππ’, πππ ππ‘πππππ πππ πππππππ ππππ πππ ππ πππππππ πππππ πππππππππ ππππππππππππ ππ π ππππβπ ππππππ π ππππππ πππ ππππππβ¦