hack and bug bounty
@hack_com
21
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
21 subscribers
hack and bug bounty
Unleashing the Power of Burp Suite in Cybersecurity: A Comprehensive Guide
Medium
Unleashing the Power of Burp Suite in Cybersecurity: A Comprehensive Guide
Introduction
hack and bug bounty
WIFI Pineapple : DIY WIFI Pineapple Setup Guide
Medium
WIFI Pineapple : DIY WIFI Pineapple Setup Guide
I was just poking around for new projects and stumbled upon something cool. I’ve always had my eye on the Hak5 Wi-Fi Pineapple to build up…
hack and bug bounty
Day 10: Insider Threats — Identifying and Mitigating Risks from Within
Medium
Day 10: Insider Threats — Identifying and Mitigating Risks from Within
Today, we’re diving into a topic that might sound like it’s straight out of a spy thriller but is all too real in the digital age, insider…
hack and bug bounty
Explanation of OWASP Top 10: Protecting Your Web Apps
Medium
Explanation of OWASP Top 10: Protecting Your Web Apps
Discover how to secure your web applications with OWASP Top 10 guidelines. Explore pros, cons, and practical code examples.
hack and bug bounty
5+All Security Resource Digest for 2023–10–10
Medium
5+All Security Resource Digest for 2023–10–10
Here are my favorite 5 security resources added to my security resource database since yesterday. These resources will range from blogs and Reddit posts, through paid resource subscriptions and…
hack and bug bounty
Apple Mail Leaks Sensitive Information About Your Location And Device
Medium
Apple Mail Leaks Sensitive Information About Your Location And Device
Mail has come a long way. From the good old days of physical letters wrapped in envelopes sent on journeys that spanned days or weeks to…
hack and bug bounty
Securing APIs using Spring Security Default Configuration
Medium
Securing APIs using Spring Security Default Configuration
Get introduced to Spring Security by securing APIs in a simple Spring Boot App
hack and bug bounty
how to dig deep to found a tricky xss via 0auth redirect in blockchain platform and get $700
Medium
how to dig deep to found a tricky xss via 0auth redirect in blockchain platform and get $700
hi hunters
👋
hack and bug bounty
Exploiting Insecure Firestore Database!
Medium
Exploiting Insecure Firestore Database!
halo semuanya kembali lagi dengan saya, ketika sedang menulis ini saya adalah seorang pencari bug ketika senggang saja, jadi mon maap jika…
hack and bug bounty
Black Hat MEA CTF 2023 — easy Web challenge- (Warm Me Up)
Medium
Black Hat MEA CTF 2023 — easy Web challenge- (Warm Me Up)
Hi players! My name is Oday Ahmed, and I am a Security Analyst. Let’s dive into the details of the easy web challenge “Warm Me Up.”
hack and bug bounty
Cybersecurity trends to watch in 2023
Medium
Cybersecurity trends to watch in 2023
Cybersecurity is a top concern for organizations of all sizes, and it’s more important than ever to stay up-to-date on the latest trends…
hack and bug bounty
13.1 Lab: Reflected XSS into HTML context with nothing encoded | 2023
Medium
13.1 Lab: Reflected XSS into HTML context with nothing encoded | 2023
This lab contains a simple reflected cross-site scripting vulnerability in the search functionality. To solve the lab, perform a cross-site…
hack and bug bounty
AWS API exposure — What they don’t tell you about the wild
Medium
AWS API exposure — What they don’t tell you about the wild
The case of aqgizxf3nteltfhpgwzhxh7yti0raxsx.lambda-url.us-east-1.on.aws
hack and bug bounty
Cyber Briefing: 2023.10.10
Medium
Cyber Briefing: 2023.10.10
👉
What’s the latest in the cyber world today?
hack and bug bounty
4 Ways To Teach Yourself and Improve Your Linux Skill
Medium
4 Ways To Teach Yourself and Improve Your Linux Skill
Why and how to learn this operating system
hack and bug bounty
Top 35+ Ethical Hacking Tools and Software You Should Know in 2023
Medium
Top 35+ Ethical Hacking Tools and Software You Should Know in 2023
The realm of ethical hacking or penetration testing has witnessed a drastic change with the advent of automated tools. Currently, several…
hack and bug bounty
TryHackMe — Walking An Application
Medium
TryHackMe — Walking An Application
Manually review a web application for security issues using only your browsers developer tools. Hacking with just your browser, no tools…
hack and bug bounty
LAB:2
Medium
LAB:2
Reflected XSS into attribute with angle brackets HTML-encoded
hack and bug bounty
Let’s Build a Network Scanner Using Python
Medium
Let’s Build a Network Scanner Using Python
One of the most powerful tools in a cybersecurity professional’s arsenal is a network scanner, which can help identify hosts, open ports…
hack and bug bounty
Uncovering a Privacy Breach: The Risk of Insecure Image Uploads
Medium
Uncovering a Privacy Breach: The Risk of Insecure Image Uploads
Hey there,
hack and bug bounty
HTTP DURUM KODLARI NEDİR ?
Medium
HTTP DURUM KODLARI NEDİR ?
HTTP nin ne olduğu hakkında “ HTTP METODLARI NEDİR ? ” adlı yazımda giriş maiyetinde temel seviye olarak giriş yapılmıştı. Günün konusu…