hack and bug bounty
@hack_com
21
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
21 subscribers
hack and bug bounty
X formerly Twitter — Apple App Reviews
Medium
X formerly Twitter — Apple App Reviews
How would you rate X?
hack and bug bounty
X與AI,值千金
Medium
X與AI,值千金
【科技探知】Elon Musk酷愛字母「X」,該符號在我們X世代中的確蠻酷,X像是打叉體現了對權威的拒絕 ,是神秘也是反叛,新X教授馬斯克在接手twitter後進行了大刀闊斧改變。其中最為人詫異的就是將twitter經典「藍鳥」Logo也改為他衷愛的「X」。
hack and bug bounty
X’s New Features: ‘Similar Posts’ and ‘Dissimilar Posts’ to Break Information Bubbles
Medium
X’s New Features: ‘Similar Posts’ and ‘Dissimilar Posts’ to Break Information Bubbles
The social media giant known as X, or Twitter, has introduced an innovative feature to enhance our online experience. With the launch of…
hack and bug bounty
Reconnaissance: The Cornerstone of Effective Pentesting
Medium
Reconnaissance: The Cornerstone of Effective Pentesting
In numerous real-world instances such as the attacks by Lockbit ransomeware Group, the power of reconnaissance in successful cyberattacks…
hack and bug bounty
Day 10: Bug Bounty (Pay Your Tuitions)
Medium
Day 10: Bug Bounty (Pay Your Tuitions)
As we embark on the 10th day of my 100 Days of Cybersecurity Challenge, I’ve got an exciting prospect to share with you — a way to…
hack and bug bounty
API- A Poetic Interpretation of Authentication and Authorization
Medium
API- A Poetic Interpretation of Authentication and Authorization
The poetic case of an Application Programming Interface
hack and bug bounty
How to Bypass Windows User Account Control
Medium
How to Bypass Windows User Account Control
UAC, short for “User Account Control,” is a Windows security feature. The User Account Control (UAC) feature first appeared in Windows…
hack and bug bounty
The great chain of duplicates. Utilizing Javascript and Logic in the bug bounty field.
Medium
The great chain of duplicates. Utilizing Javascript and Logic in the bug bounty field.
Hi, in this blog I’ll walk you through how analysing javascript files and chaining bugs made me so close to get some bounties. This might be a long blog but i’ll try to split it into several points/…
hack and bug bounty
Passing The eWPTv2 Cybersecurity Exam as a 14-year-old.
Medium
Passing The eWPTv2 Cybersecurity Exam as a 14-year-old.
Background
hack and bug bounty
Elon Musk shows product of his AI company: ‘sarcastic’ chatbot
Medium
Elon Musk shows product of his AI company: ‘sarcastic’ chatbot
Elon Musk has taken a look at his company X AI’s latest product: an advanced AI chatbot, similar to ChatGPT.
hack and bug bounty
XSS Attacks: advanced techniques to bypass data sanitization
Medium
XSS Attacks: advanced techniques to bypass data sanitization
Disclaimer: this tutorial is for education purposes only. I am not liable if you do something illegal with these techniques. I just think…
hack and bug bounty
Understanding the Basics of Port Scanning and Hunting for Suspicious Port Activities
Medium
Understanding the Basics of Port Scanning and Hunting for Suspicious Port Activities
Understanding the basics of port scanning and proactively hunting for suspicious port activities are crucial components of safeguarding…
hack and bug bounty
Python Libraries and Frameworks Specifically Designed for Cybersecurity
Medium
Python Libraries and Frameworks Specifically Designed for Cybersecurity
Python is a powerful programming language that has made significant inroads into the field of cybersecurity. Its simplicity and rich…
hack and bug bounty
Fortifying Applications: A Guide to Modern Application Security
Medium
Fortifying Applications: A Guide to Modern Application Security
Introduction
hack and bug bounty
Nessus Essentials Lab: Technical Walkthrough
Medium
Nessus Essentials Lab: Technical Walkthrough
Nessus Essentials Lab: Vulnerability Management
hack and bug bounty
Setting Up a Private Burp Collaborator Server on Google Cloud Platform
Medium
Setting Up a Private Burp Collaborator Server on Google Cloud Platform
A Guide for Deploying a Private Burp Collaborator Server on GCP
hack and bug bounty
Unmasking the Pentester Club: Exploring CEH v12 Footprinting & Reconnaissance Secrets
Medium
Unmasking the Pentester Club: Exploring CEH v12 Footprinting & Reconnaissance Secrets
In this highly informative video, join Pentester Club as we delve into the realm of Footprinting and Reconnaissance, uncovering the secrets…
hack and bug bounty
Complete CEH v12 Labs Setup Guide: Join the Pentester Club!
Medium
Complete CEH v12 Labs Setup Guide: Join the Pentester Club!
Welcome to the ultimate CEH v12 Labs Setup Guide! In this video, we are excited to show you how to join the prestigious Pentester Club by…
hack and bug bounty
Unleashing the Power of SSH Harvester Penetration Testing
Medium
Unleashing the Power of SSH Harvester Penetration Testing
Welcome to our YouTube video on “Unveiling OpenSSH Security Risks: Automating Password Harvesting”. In this eye-opening presentation, we…
hack and bug bounty
NucleiFuzzer: Automating XSS Detection for Unrivaled Security
Medium
NucleiFuzzer: Automating XSS Detection for Unrivaled Security
In this video, we introduce NucleiFuzzer, an exceptionally powerful automation tool designed specifically for detecting cross-site…
hack and bug bounty
Exploring the Untapped Realm: Google Dorking Unveiled
Medium
Exploring the Untapped Realm: Google Dorking Unveiled
In this captivating video, dive deep into the fascinating world of “Google Dorking” as we unveil the incredible secrets hidden within the…