hack and bug bounty
@hack_com
21
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
21 subscribers
hack and bug bounty
Perfect Loader Implementations
Medium
Perfect Loader Implementations
Thank you to SpecterOps for supporting this research and to Lee and Sarah for proofreading and editing! Crossposted on GitHub.
hack and bug bounty
Cybersecurity: Protecting Against 99% of Attacks — Insights from Microsoft’s 2023 Security Report
Medium
Cybersecurity: Protecting Against 99% of Attacks — Insights from Microsoft’s 2023 Security Report
In today’s ever-evolving digital landscape, cybersecurity stands as a paramount challenge. As technology leaders, it is our responsibility…
hack and bug bounty
A list of SANS TOP 25
Medium
A list of SANS TOP 25
🔍
Are you familiar with the SANS TOP 25? It’s a list of the most dangerous software vulnerabilities that can be exploited by attackers…
hack and bug bounty
What is CVE, CWE and NVD!
Medium
What is CVE, CWE and NVD!
🔒
Let’s Raise Cybersecurity Awareness!
🔒
hack and bug bounty
Understanding the SANS TOP 25: Prioritizing Cybersecurity Threats
Medium
Understanding the SANS TOP 25: Prioritizing Cybersecurity Threats
In the ever-evolving world of cybersecurity, identifying and mitigating threats is a top priority for organizations. To aid in this crucial…
hack and bug bounty
How to move your following from X to Threads (or anywhere)
Medium
How to move your following from X to Threads (or anywhere)
Thanks to recent breaking news misinformation drowning the network, and Musk’s ‘pay or further ‘enshitification’ until you do’ policy…
hack and bug bounty
Defending Against SIM Swap Attacks: How Cloaked Wireless Enhances Security
Medium
Defending Against SIM Swap Attacks: How Cloaked Wireless Enhances Security
In an increasingly interconnected world, mobile devices are an integral part of our daily lives. We use them for communication, work, and…
hack and bug bounty
How I Uncovered a Stored XSS in octenium.com
Medium
How I Uncovered a Stored XSS in octenium.com
Hey folks,
hack and bug bounty
Earn Money with Fun! Find Vulnerability in Random Sites
Medium
Earn Money with Fun! Find Vulnerability in Random Sites
This article I will tell you about how I make money from sites that do not have a Bug bounty program, because I think this is very…
hack and bug bounty
A Practical Guide to Google Dorking | Day13 of 30DaysOfOSINT
Medium
A Practical Guide to Google Dorking | Day13 of 30DaysOfOSINT
The main aim of writing this blog is to get you all familiar with basic google dorks and their use cases.
hack and bug bounty
SQL Injection on HTTP Headers: Live Hacking
Medium
SQL Injection on HTTP Headers: Live Hacking
Custom HTTP Header Exposed
hack and bug bounty
✔
- …
Medium
✔
𝙰 𝚣𝚎𝚛𝚘-𝚌𝚕𝚒𝚌𝚔 𝚊𝚝𝚝𝚊𝚌𝚔 𝚝𝚊𝚔𝚎𝚜 𝚊𝚍𝚟𝚊𝚗𝚝𝚊𝚐𝚎 𝚘𝚏…
✔
𝙰 𝚣𝚎𝚛𝚘-𝚌𝚕𝚒𝚌𝚔 𝚊𝚝𝚝𝚊𝚌𝚔 𝚝𝚊𝚔𝚎𝚜 𝚊𝚍𝚟𝚊𝚗𝚝𝚊𝚐𝚎 𝚘𝚏 𝚟𝚞𝚕𝚗𝚎𝚛𝚊𝚋𝚒𝚕𝚒𝚝𝚒𝚎𝚜 𝚒𝚗 𝚜𝚘𝚏𝚝𝚠𝚊𝚛𝚎 𝚝𝚘 𝚌𝚊𝚛𝚛𝚢 𝚘𝚞𝚝 𝚊𝚗 𝚊𝚝𝚝𝚊𝚌𝚔 𝚠𝚒𝚝𝚑𝚘𝚞𝚝 𝚞𝚜𝚎𝚛 𝚒𝚗𝚝𝚎𝚛𝚊𝚌𝚝𝚒𝚘𝚗. 𝙱𝚢 𝚎𝚡𝚙𝚕𝚘𝚒𝚝𝚒𝚗𝚐 𝚝𝚑𝚒𝚜 𝚟𝚞𝚕𝚗𝚎𝚛𝚊𝚋𝚒𝚕𝚒𝚝𝚢, 𝚝𝚑𝚎 𝚎𝚡𝚙𝚕𝚘𝚒𝚝 𝚌𝚊𝚗 𝚒𝚗𝚜𝚝𝚊𝚕𝚕 𝚖𝚊𝚕𝚠𝚊𝚛𝚎 𝚘𝚛 𝚙𝚎𝚛𝚏𝚘𝚛𝚖 𝚘𝚝𝚑𝚎𝚛 𝚖𝚊𝚕𝚒𝚌𝚒𝚘𝚞𝚜 𝚒𝚗𝚝𝚎𝚛𝚊𝚌𝚝𝚒𝚘𝚗𝚜 𝚘𝚗 𝚊 𝚞𝚜𝚎𝚛’𝚜 𝚍𝚎𝚟𝚒𝚌𝚎 𝚠𝚒𝚝𝚑𝚘𝚞𝚝 𝚝𝚑𝚎 𝚝𝚊𝚛𝚐𝚎𝚝…
hack and bug bounty
Day 104 — Mastering Penetration Tester : World of Ethical Hacking
Medium
Day 104 — Mastering Penetration Tester : World of Ethical Hacking
Welcome to the 104th day of our incredible journey through the intricate web of cybersecurity!
hack and bug bounty
Free Ethical Hacking (Penetration Testing) Workshop: Your Gateway to Cybersecurity Skills!
Medium
Free Ethical Hacking (Penetration Testing) Workshop: Your Gateway to Cybersecurity Skills!
Hey there, tech enthusiasts and curious minds! We’ve got some exciting news to share. Hexa Defend is hosting a Free Ethical Hacking…
hack and bug bounty
Difference Between Hacking and Ethical Hacking?
Medium
Difference Between Hacking and Ethical Hacking?
hack and bug bounty
The Power of Write-Ups: Enhancing Skills and Knowledge
Medium
The Power of Write-Ups: Enhancing Skills and Knowledge
Write-ups, in the form of articles, essays, and documentation, have emerged as a powerful tool for improving and enhancing various skills…
hack and bug bounty
TryHackMe-Basic Pentesting (WriteUp)
Medium
TryHackMe-Basic Pentesting (WriteUp)
Greetings People! I hope you’re all doing great. Another one in the writeups list.
hack and bug bounty
Unmasking Vulnerabilities: A Deep Dive into ShellShock Exploitation
Medium
Unmasking Vulnerabilities: A Deep Dive into ShellShock Exploitation
Introduction
hack and bug bounty
Unleashing the Power of Burp Suite in Cybersecurity: A Comprehensive Guide
Medium
Unleashing the Power of Burp Suite in Cybersecurity: A Comprehensive Guide
Introduction
hack and bug bounty
WIFI Pineapple : DIY WIFI Pineapple Setup Guide
Medium
WIFI Pineapple : DIY WIFI Pineapple Setup Guide
I was just poking around for new projects and stumbled upon something cool. I’ve always had my eye on the Hak5 Wi-Fi Pineapple to build up…
hack and bug bounty
Day 10: Insider Threats — Identifying and Mitigating Risks from Within
Medium
Day 10: Insider Threats — Identifying and Mitigating Risks from Within
Today, we’re diving into a topic that might sound like it’s straight out of a spy thriller but is all too real in the digital age, insider…