hack and bug bounty
@hack_com
21
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
21 subscribers
hack and bug bounty
Git Rekt #2 – Steghide
hack and bug bounty
Git Rekt #1 – Siim/ftp
hack and bug bounty
ICTF baby_shop Writeup
hack and bug bounty
The Untold Truth: SQL Injection Exposed!
Medium
The Untold Truth: SQL Injection Exposed!
In this eye-opening video, we delve into the widely debated topic of SQL Injection and uncover the truth behind its effectiveness. Prepare…
hack and bug bounty
Bug Bounty Platform HackerOne Has Paid Over $300 Million to Ethical Hackers
Medium
Bug Bounty Platform HackerOne Has Paid Over $300 Million to Ethical Hackers
HackerOne, the world’s leading bug bounty platform, has announced that it has paid out over $300 million in bug bounties to ethical…
hack and bug bounty
Budget Change: IDOR 1000$ Bug
Medium
Budget Change: IDOR 1000$ Bug
Discover how an IDOR vulnerability allowed unauthorized budget changes in Private Program. Learn the steps to reproduce this security flaw…
hack and bug bounty
THM-ROOTME
Medium
THM-ROOTME
Room Name: RootMe
hack and bug bounty
Wait, Bitcoin is worth more than Tesla? And politicians worldwide struggle to deal with AI
Medium
Wait, Bitcoin is worth more than Tesla? And politicians worldwide struggle to deal with AI
Bitcoin is worth more than Tesla, Western politicians struggle with AI policies and Elon Musk wants to make banks obsolete with X, The…
hack and bug bounty
Paths of Becoming Security Engineer
Medium
Paths of Becoming Security Engineer
Introduction
hack and bug bounty
THM-Rootme
Medium
THM-Rootme
Link Tryhackme
hack and bug bounty
Network Protocols and Devices
Medium
Network Protocols and Devices
Let’s start by understanding network protocols and then move on to network devices.
hack and bug bounty
RootMe CTF | TryHackMe
Medium
RootMe CTF | TryHackMe
Begin by launching the virtual machine, and as it deploys, take note of the IP address assigned to your instance. Prerequisites: You need to establish connectivity by following the instructions…
hack and bug bounty
TryHackMe — Rootme CTF Writeup
Medium
TryHackMe — Rootme CTF Writeup
In this writeup we will be discussing in detail how to solve the Rootme room from TryHackMe. Let’s get started!
hack and bug bounty
THM: Root Me — My Hands-On Experience
Medium
THM: Root Me — My Hands-On Experience
Link: https://tryhackme.com/room/rrootme
hack and bug bounty
The Transformation of Twitter: A Year Under Elon Musk
Medium
The Transformation of Twitter: A Year Under Elon Musk
Summary
hack and bug bounty
Application Security in SSDLC
Medium
Application Security in SSDLC
In my previous blog, as I stated the high level explanation of Application Security, in this one I will be stating how it can be…
hack and bug bounty
EC2 User-data to RCE
Medium
EC2 User-data to RCE
Hi Guys, Today we are going to see how a single AWS misconfiguration can lead to remote code execution on an EC2 instance. In the upcoming…
hack and bug bounty
Hostedscan: The One-Stop Shop for Website Security
Medium
Hostedscan: The One-Stop Shop for Website Security
Don’t Wait Until It’s too Late
hack and bug bounty
How to Crush BSCP Exam in 75 Mins — BSCP Review
Medium
How to Crush BSCP Exam in 75 Mins — BSCP Review
Hi, I’m Ossama Yasser, and this is a guide to pass the Burp Suite Certified Practitioner Exam (BSCP) easily.
hack and bug bounty
Descubra como encontrar buckets ocultos na nuvem da Amazon S3!
Medium
Descubra como encontrar buckets ocultos na nuvem da Amazon S3!
👀
🔍
Hoje vamos falar sobre uma parada que é pura emoção: encontrar diretórios ocultos nos famosos S3 buckets da Amazon.
hack and bug bounty
Understanding Prototype Pollution Through Analogy
Medium
Understanding Prototype Pollution Through Analogy
In JavaScript, objects have a prototype, which is itself another object from which they inherit properties. When we create a new object, it can inherit properties and methods from a prototype object…