hack and bug bounty
@hack_com
21
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
21 subscribers
hack and bug bounty
Day 11: GDPR, Kenya Data Protection Act, and Data Privacy — Navigating Compliance.
Medium
Day 11: GDPR, Kenya Data Protection Act, and Data Privacy — Navigating Compliance.
Welcome back, ! Today I am diving into the critical topic of compliance with data protection regulations — specifically, GDPR (General…
hack and bug bounty
13.2 Lab: Stored XSS into HTML context with nothing encoded | 2023
Medium
13.2 Lab: Stored XSS into HTML context with nothing encoded | 2023
This lab contains a stored cross-site scripting vulnerability in the comment functionality. To solve this lab, submit a comment that calls…
hack and bug bounty
Unveiling the Secrets of SQL Injection: A Comprehensive Guide for Ethical Hackers
Medium
Unveiling the Secrets of SQL Injection: A Comprehensive Guide for Ethical Hackers
SQL Injection (SQLi) is a prevalent cybersecurity threat that has plagued web applications for years. As an ethical hacker, it’s crucial to…
hack and bug bounty
Unveiling the Power of HTML Injection in Ethical Hacking
Medium
Unveiling the Power of HTML Injection in Ethical Hacking
Introduction
hack and bug bounty
NHS — The multitude of Security flaws
Medium
NHS — The multitude of Security flaws
The article after a long attempt at reaching the NHS
hack and bug bounty
Web Application Vulnerabilities: CRLF Injection and Beyond
Medium
Web Application Vulnerabilities: CRLF Injection and Beyond
Hello there! I’m Pratik Dabhi, a bug bounty hunter and penetration tester. Many of you may already be familiar with me, but for those who…
hack and bug bounty
TryHackMe-Sakura Room(WriteUp)
Medium
TryHackMe-Sakura Room(WriteUp)
Hello charming people! My first OSINT challenge writeup eventhough I played many more of them before. Back then I didn’t knew what was the…
hack and bug bounty
Mad Devs’ #17 Newsletter. September 2023
Medium
Mad Devs’ #17 Newsletter. September 2023
Unleash cyber resilience: Learn more about how to safeguard big data and identify cyber threats in your organization.
hack and bug bounty
What actually is OAuth 2.0?
Medium
What actually is OAuth 2.0?
Hey there, Alex here!
😄
hack and bug bounty
How I Gained Access to Adminer (DBMS) via Leaked Credentials
Medium
How I Gained Access to Adminer (DBMS) via Leaked Credentials
.بِسْم اللَّه الرَّحْمن الرَّحِيم . . اللَّهمَّ صَلِّ وَسلَّم وبارك على نَبِينَا مُحمَّد
hack and bug bounty
Cyber Briefing: 2023.10.11
Medium
Cyber Briefing: 2023.10.11
👉
What’s trending in cybersecurity today?
hack and bug bounty
Solving Game of Active Directory (GOAD) by Orange Cyberdefense Part-1
Medium
Solving Game of Active Directory (GOAD) by Orange Cyberdefense Part-1
smb signing is disabled and version 1 is enabled for some hosts.
hack and bug bounty
Pourquoi avons-nous tant de mal à le quitter ?
Medium
Pourquoi avons-nous tant de mal à le quitter ?
Les dernières Rencontres de la communication numérique de Cap’Com ont été une nouvelle fois l’occasion de débattre entre nous sur la…
hack and bug bounty
Disclosure email address of any Wordpress user via redacted-service
Medium
Disclosure email address of any Wordpress user via redacted-service
Hello fellas, in this write-up, I’m gonna talk about disclosing email address of any WordPress user by using an another service within…
hack and bug bounty
Pwnagotchi
Medium
Pwnagotchi
Uyarı: Makalede bulunan konular bilgi ve eğitim amacı ile yazılmıştır. Donanım ve teknikleri kullanmadan önce 5237 sayılı Türk Ceza Kanunu…
hack and bug bounty
How Do I Know If My Phone Is Hacked: A Comprehensive Guide
Medium
How Do I Know If My Phone Is Hacked: A Comprehensive Guide
In this digital age, our smartphones have become an extension of ourselves, containing a wealth of personal and sensitive information. With…
hack and bug bounty
Sqlmap
Medium
Sqlmap
What is Sqlmap?
hack and bug bounty
Read Spy x Family, Vol. 1 (1) by Tatsuya Endo
Medium
Read Spy x Family, Vol. 1 (1) by Tatsuya Endo
Review Spy x Family Vol by Tatsuya Endo
hack and bug bounty
Vulnhub ICA: 1
Medium
Vulnhub ICA: 1
| Capture the Flag (CTF) Challange | Machine Difficulty: Easy |
hack and bug bounty
Lybra Finance x Immunefi Bug Bounty Program earn up to $100,000
Medium
Lybra Finance x Immunefi Bug Bounty Program earn up to $100,000
Lybra Finance’s Bug Bounty Policy
hack and bug bounty
Cybersecurity in Space: Protecting GPS Signals
Medium
Cybersecurity in Space: Protecting GPS Signals
“Cybersecurity in Space: Protecting GPS Signals” is published by SimeonOnSecurity.