hack and bug bounty
@hack_com
21
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
21 subscribers
hack and bug bounty
Rethinking CISO Accountability: A Call for Balance in Cybersecurity Leadership
Medium
Rethinking CISO Accountability: A Call for Balance in Cybersecurity Leadership
A Reflection on Current Events and the Path Forward
hack and bug bounty
Automating CSRF Detection in WordPress Plugins with Semgrep
Medium
Automating CSRF Detection in WordPress Plugins with Semgrep
Introduction
hack and bug bounty
Hacking the Mr. Robot Room on TryHackMe: A Step-by-Step Guide
Medium
Hacking the Mr. Robot Room on TryHackMe: A Step-by-Step Guide
Join me on a thrilling cyber adventure as we dive into the “Mr. Robot” room on TryHackMe, an engaging and practical cybersecurity training…
hack and bug bounty
Hacking Azure Key Vault
Medium
Hacking Azure Key Vault
Exploring Authentication Problem
hack and bug bounty
TryHackMe —Weasel Walkthrough
Medium
TryHackMe —Weasel Walkthrough
I’ve learned a lot from the various free resources on the internet, and I often discover interesting things by reading walkthroughs written…
hack and bug bounty
DEV BLOG: Competing in the 2023 Individual Games at the National Cyber League
Medium
DEV BLOG: Competing in the 2023 Individual Games at the National Cyber League
Like any computer science student with a laser-focused passion for security, I became aggressively ready for the games at NCL, clearing my…
hack and bug bounty
SoSimple CTF Walkthrough
Medium
SoSimple CTF Walkthrough
SoSimple is a medium difficulty Linux box. Let’s get into it!
hack and bug bounty
My first step into Cyber Security:
Medium
My first step into Cyber Security:
In the world of technology, the transition from one field to another can often happen unexpectedly. My name is Pavan Kharche, and I was…
hack and bug bounty
ถึงเวลาเลิกใช้ Basic Authentication แล้ว เพราะความปลอดภัยที่มีจำกัด
Medium
ถึงเวลาเลิกใช้ Basic Authentication แล้ว เพราะความปลอดภัยที่มีจำกัด
ในโลกออนไลน์ที่เต็มไปด้วยการพัฒนาอย่างไม่หยุดยั้งและภัยคุกคามทางไซเบอร์ที่เพิ่มขึ้นอย่างต่อเนื่อง…
hack and bug bounty
Windows Active Directory Hacking Lab Setup — Part 1, Domain Controller
Medium
Windows Active Directory Hacking Lab Setup — Part 1, Domain Controller
This post will outline setting up a hacking lab for Active Directory Pentesting. Full disclosure, this lab is based off of the TCM…
hack and bug bounty
Reimagining PayPal’s Legacy: Elon Musk’s Vision for X as the Financial Powerhouse
Medium
Reimagining PayPal’s Legacy: Elon Musk’s Vision for X as the Financial Powerhouse
Elon’s intention for X is not just as another tech platform but as a centerpiece in the financial world. He envisions X handling not only…
hack and bug bounty
The Importance of Ethical Hacking in Ensuring Cybersecurity
Medium
The Importance of Ethical Hacking in Ensuring Cybersecurity
Introduction
hack and bug bounty
What is an ethical hacker?
Medium
What is an ethical hacker?
An ethical hacker, also known as a white hat hacker, is a security professional who is hired by an organization to legally break into its…
hack and bug bounty
“AI and Machine Learning in Cybersecurity Promises and Challenges”
Medium
“AI and Machine Learning in Cybersecurity Promises and Challenges”
As the digital world continues to evolve, so do the threats in cyberspace. In the ongoing battle against cyberattacks, AI and machine…
hack and bug bounty
“Protecting Your Digital Identity A Guide to Online Privacy”
Medium
“Protecting Your Digital Identity A Guide to Online Privacy”
In our increasingly connected world, our digital identity is as important as our physical one. Yet, many of us may not realize the extent…
hack and bug bounty
“Hacking Elections Safeguarding Democracy in the Digital Age”
Medium
“Hacking Elections Safeguarding Democracy in the Digital Age”
The integrity of elections is a cornerstone of any democracy. In our digital age, however, elections face unprecedented challenges from…
hack and bug bounty
“The Human Element in Cybersecurity Why Your Employees Matter”
Medium
“The Human Element in Cybersecurity Why Your Employees Matter”
In the ever-evolving landscape of cybersecurity, organizations are investing heavily in advanced technologies, firewalls, and intrusion…
hack and bug bounty
“Blockchain Technology A Game-Changer for Cybersecurity”
Medium
“Blockchain Technology A Game-Changer for Cybersecurity”
In a world increasingly reliant on digital technologies, the need for robust cybersecurity has never been more critical. Cyberattacks, data…
hack and bug bounty
“Cybersecurity for Small Businesses A Comprehensive Guide”
Medium
“Cybersecurity for Small Businesses A Comprehensive Guide”
In today’s digital age, cybersecurity has become a critical concern for businesses of all sizes. While large corporations often make…
hack and bug bounty
Unlocking the Power of MegaPing: Mastering Port and Service Discovery
Medium
Unlocking the Power of MegaPing: Mastering Port and Service Discovery
MegaPing is a robust network scanning and monitoring tool designed to help IT professionals and network administrators perform…
hack and bug bounty
#kali Linux — BillCipher Information Gathering tool
Medium
#kali Linux — BillCipher Information Gathering tool
BillCipher is an open-source information gathering tool specifically designed for use in Kali Linux. It’s a versatile tool that allows…