hack and bug bounty
@hack_com
21
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
21 subscribers
hack and bug bounty
Mastering Windows Command-Line Tools and OS Features
Medium
Mastering Windows Command-Line Tools and OS Features
In today's digital age, cyber security and IT professionals need to be well-versed in the tools and features of Microsoft’s Windows…
hack and bug bounty
Not all the DLP Solutions are Equally Useful: How to Choose the System and not be Disappointed
Medium
Not all the DLP Solutions are Equally Useful: How to Choose the System and not be Disappointed
In this article, we are going to help you choose the right DLP class system for you.
hack and bug bounty
Top 14 VAPT tools to secure your organization in 2024 and beyond
Medium
Top 14 VAPT tools to secure your organization in 2024 and beyond
Looking for top VAPT tools for security experts? Look no further! Here is the list of best VAPT tools for to secure your organization
hack and bug bounty
Cyber Security Certifications | Cybersecurity Training
Medium
Cyber Security Certifications | Cybersecurity Training
In today’s digitally connected world, the significance of cybersecurity cannot be overstated. With cyber threats and attacks growing in…
hack and bug bounty
Do You Know About What These Hacking Tools Can Do.
Medium
Do You Know About What These Hacking Tools Can Do.
If you wish to keep your or your company’s sensitive information protected in this situation, you need be aware of these hacking tools. You…
hack and bug bounty
Is Your Computer Safe? How Drones Can Hack Your System in Seconds
Medium
Is Your Computer Safe? How Drones Can Hack Your System in Seconds
Introduction:
hack and bug bounty
X’s Audio and Video Calls — Communicate Better with X
Medium
X’s Audio and Video Calls — Communicate Better with X
X (Twitter) is all set to release a new feature, X’s audio and video calls. However, it is only available for Premium subscribers. The…
hack and bug bounty
CRITICAL BUG Alert: How I HACKED into a company’s DATABASE
Medium
CRITICAL BUG Alert: How I HACKED into a company’s DATABASE
First off, I want to say a big thank you for the incredible support on my first blog. I really appreciate it. If you haven’t had a chance…
hack and bug bounty
“Machine Learning Marvels How AI is Reshaping Data Science”
Medium
“Machine Learning Marvels How AI is Reshaping Data Science”
The field of data science has undergone a remarkable transformation in recent years, thanks to the advent of Artificial Intelligence (AI)…
hack and bug bounty
How I Hacked a Domain Controller in 3 Easy Steps
Medium
How I Hacked a Domain Controller in 3 Easy Steps
Sometimes getting the keys to the kingdom is too easy and can have devastating consequences if it gets into the hands of the wrong people…
hack and bug bounty
What is HATEOAS and why is it important for RESTful APIs?
Medium
What is HATEOAS and why is it important for RESTful APIs?
HATEOAS stands for Hypermedia as the Engine of Application State. It is one of the constraints of the REST architectural style that defines…
hack and bug bounty
A Million Journey
Medium
A Million Journey
How I Become a Millionaire
hack and bug bounty
Android Hacking Masterclass | The only guide you need to secure your android apps
Medium
Android Hacking Masterclass | The only guide you need to secure your android apps
In the ever-evolving world of mobile app development, one aspect remains a constant concern: security. As the Android platform continues to…
hack and bug bounty
“Data Science and the Future of Work Skills You Need to Stay Relevant”
Medium
“Data Science and the Future of Work Skills You Need to Stay Relevant”
The world is undergoing a profound digital transformation, and data science is at the forefront of this revolution. As businesses and…
hack and bug bounty
“Big Data, Big Impact How Data Science is Transforming Industries”
Medium
“Big Data, Big Impact How Data Science is Transforming Industries”
In the age of digital transformation, data has become one of the most valuable assets for businesses across various industries. The…
hack and bug bounty
“The Role of Data Science in Healthcare Revolutionizing Patient Care”
Medium
“The Role of Data Science in Healthcare Revolutionizing Patient Care”
In the ever-evolving landscape of healthcare, data science has emerged as a transformative force, reshaping the way we approach patient…
hack and bug bounty
17.1 Lab: Manipulating WebSocket messages to exploit vulnerabilities 2023
Medium
17.1 Lab: Manipulating WebSocket messages to exploit vulnerabilities 2023
This online shop has a live chat feature implemented using WebSockets. Chat messages that you submit are viewed by a support agent in real…
hack and bug bounty
2FA Bypass: How not to implement two-factor authentication
Medium
2FA Bypass: How not to implement two-factor authentication
Two-factor authentication (2FA) is an important security measure that helps protect against unauthorized access to accounts and systems. It…
hack and bug bounty
Cyber Briefing: 2023.10.30
Medium
Cyber Briefing: 2023.10.30
👉
What’s happening in cybersecurity today? NGINX Ingress, Kubernetes, Hunters International, Hive Ransomware, GHOSTPULSE, MSIX, Windows…
hack and bug bounty
From Unauthenticated SQL Injection to Remote Command Execution (RCE)
Medium
From Unauthenticated SQL Injection to Remote Command Execution (RCE)
I’m back with another blog post discussing an SQL injection vulnerability that I found during one of my engagements. While SQL injection…
hack and bug bounty
Broken Access Control Leading to Privilege Escalation
Medium
Broken Access Control Leading to Privilege Escalation
Broken Access Control is the number one vulnerability on the OWASP top 10 list, and I understand why, almost every pentest I conduct I find…