hack and bug bounty
@hack_com
21
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
21 subscribers
hack and bug bounty
Top 10 Challenges in Application Security!
Medium
Top 10 Challenges in Application Security!
Application security is the practice of protecting applications from cyber threats. It is a complex and ever-evolving field, as new threats…
hack and bug bounty
#2 Host Header Injection — Secure Code Explain
Medium
#2 Host Header Injection — Secure Code Explain
Here is an example of vulnerable code that is susceptible to a Host Header Injection Attack :
hack and bug bounty
#cyberSecurity #cyberAtack #CyberCrime #ethicalHacking #malware #penTesting #penetrationTesting
Medium
#cyberSecurity #cyberAtack #CyberCrime #ethicalHacking #malware #penTesting #penetrationTesting
hack and bug bounty
Security report Write-up (CORS) | Logo URL Bypass leads to IP stealing |Bounty — €400
Medium
Security report Write-up (CORS) | Logo URL Bypass leads to IP stealing |Bounty — €400
Hello, My name is Ashar Mahmood, a passionate 21-year-old cybersecurity enthusiast, am thrilled to share this security write-up on the…
hack and bug bounty
Securing the Connected World: The Power of VAPT in IoT Security
Medium
Securing the Connected World: The Power of VAPT in IoT Security
The Internet of Things (IoT) has rapidly transformed the way we live and work, connecting everyday devices to the internet, enabling remote…
hack and bug bounty
Exploring CSRF Vulnerabilities in Ethical Hacking: Unmasking the Hidden Threats
Medium
Exploring CSRF Vulnerabilities in Ethical Hacking: Unmasking the Hidden Threats
Understanding and Mitigating CSRF Attacks in the World of White Hat Hacking
hack and bug bounty
Top 7 EC-Council Free Courses For Cybersecurity Beginners
Medium
Top 7 EC-Council Free Courses For Cybersecurity Beginners
💻
Hi, Ajak Amico’s welcome back to another blog today. I will show you the top 7 Ec-Council Free Courses and how to get them. Before…
hack and bug bounty
Unmasking the Hydra: The Art of Ethical Hacking and Brute Force Attacks
Medium
Unmasking the Hydra: The Art of Ethical Hacking and Brute Force Attacks
Introduction
hack and bug bounty
Day 12: HIPAA Compliance — Protecting Healthcare Data in a Digital World
Medium
Day 12: HIPAA Compliance — Protecting Healthcare Data in a Digital World
Hello, dear readers. Welcome to Day 12 of Cyber Security Awareness month into the world of health data protection. Today, I am diving deep…
hack and bug bounty
HTB: Starting Point — Preignition Machine
Medium
HTB: Starting Point — Preignition Machine
Penetration Test Report
hack and bug bounty
Mastering Android Studio: A Comprehensive Guide for Android Development
Medium
Mastering Android Studio: A Comprehensive Guide for Android Development
Introduction
hack and bug bounty
Into the Unknown: A Guide for Newbies in Cybersecurity
Medium
Into the Unknown: A Guide for Newbies in Cybersecurity
During this session, I provided detailed insights into the thrilling, yet often overwhelming, realm of cybersecurity. This edition of…
hack and bug bounty
5+All Security Resource Digest for 2023–10–12
Medium
5+All Security Resource Digest for 2023–10–12
Here are my favorite 5 security resources added to my security resource database since yesterday. These resources will range from blogs and Reddit posts, through paid resource subscriptions and…
hack and bug bounty
Understanding API Security
Medium
Understanding API Security
What is an API?
hack and bug bounty
X performs worst at fighting climate misinformation
Medium
X performs worst at fighting climate misinformation
🌐
In the fight against climate misinformation, X (formerly Twitter) has emerged as the poorest performer among major social-media…
hack and bug bounty
Generating Reverse Shell using Msfvenom One Liner Payload
Medium
Generating Reverse Shell using Msfvenom One Liner Payload
In this video, we dive deep into the world of reverse shell techniques using the powerful tool Msfvenom. With our focus on the one-liner…
hack and bug bounty
Penetration Testing On Voip Asterisk Server
Medium
Penetration Testing On Voip Asterisk Server
In this informative video, we delve into the crucial topic of securing your VoIP Asterisk server through effective penetration testing and…
hack and bug bounty
TryHackMe-Kenobi(WriteUp)
Medium
TryHackMe-Kenobi(WriteUp)
Hey Everyone! Welcome back. Here with another one from TryHackMe. I hope you’ll love it.
hack and bug bounty
The Secret to Growing 2.7 Times Faster on X
Medium
The Secret to Growing 2.7 Times Faster on X
Are you tired of spending hours creating without seeing results? CASE STUDY: Use images to increase your reach by ~2.7 times.
hack and bug bounty
13.3 Lab: DOM XSS in document.write sink using source location.search | 2023
Medium
13.3 Lab: DOM XSS in document.write sink using source location.search | 2023
This lab contains a DOM-based XSS in the search query. It uses document.write function to writes data out to the page. The function is…
hack and bug bounty
Exploit CVE-2023–36845-RCE-By CTRL
Medium
Exploit CVE-2023–36845-RCE-By CTRL