hack and bug bounty
@hack_com
21
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
21 subscribers
hack and bug bounty
The Best Linux Distributions for Ethical Hacking (Updated)
Medium
The Best Linux Distributions for Ethical Hacking (Updated)
Linux Distributions That Will Make You a Master Ethical Hacker
hack and bug bounty
“AI and Bias Tackling Fairness and Inclusion”
Medium
“AI and Bias Tackling Fairness and Inclusion”
Artificial Intelligence (AI) has become an integral part of our daily lives, influencing decisions that range from job applications to…
hack and bug bounty
“AI in Art The Intersection of Creativity and Technology”
Medium
“AI in Art The Intersection of Creativity and Technology”
Art and technology have often been viewed as distinct realms of human expression. Art is a manifestation of human creativity, emotions, and…
hack and bug bounty
“AI and Sustainability Green Technologies for a Better World”
Medium
“AI and Sustainability Green Technologies for a Better World”
In an era defined by environmental challenges and the urgent need for sustainable solutions, artificial intelligence (AI) is emerging as a…
hack and bug bounty
20.1 Lab: Basic password reset poisoning | 2023
Medium
20.1 Lab: Basic password reset poisoning | 2023
This lab is vulnerable to password reset poisoning. The user Carlos will carelessly click on any links in emails that he receives. To solve…
hack and bug bounty
“The Future of AI Beyond Machine Learning and Deep Learning”
Medium
“The Future of AI Beyond Machine Learning and Deep Learning”
Artificial Intelligence (AI) has come a long way, and machine learning and deep learning have been the driving forces behind many of its…
hack and bug bounty
Twitter Creator Monetization Program: How to Earn for content creators
Medium
Twitter Creator Monetization Program: How to Earn for content creators
Are you a Twitter enthusiast looking for ways to turn your tweets into a steady stream of passive income? Twitter’s new Revenue Share…
hack and bug bounty
Race Conditions with pipelining
Medium
Race Conditions with pipelining
Hi guy’s
Approximately a year ago, I identified a race condition using pipelining technique that allowed me to add a significant number of…
hack and bug bounty
Spring Boot ile JSON Web Token (JWT) Kullanarak Güvenli Oturum Yönetimi-Örnek Uygulama
Medium
Spring Boot ile JSON Web Token (JWT) Kullanarak Güvenli Oturum Yönetimi-Örnek Uygulama
Dijital dünyada hızla büyüyen web uygulamaları ve API’ler, kullanıcıların çeşitli hizmetlere erişmesini, veri paylaşmasını ve iş yapmasını…
hack and bug bounty
Track Your Boyfriend’s Phone In Your Travel Time
Medium
Track Your Boyfriend’s Phone In Your Travel Time
In this age of technology, maintaining trust in a relationship can be challenging, especially when distance separates you and your partner…
hack and bug bounty
Blind SQL injection with conditional responses (From PortSwigger)
Medium
Blind SQL injection with conditional responses (From PortSwigger)
This is a beginner friendly SQL Injection lab from portswigger.net. This lab helps beginners set their foot in blind SQL injection…
hack and bug bounty
Unveiling the Secrets of XSS Bypass: Harnessing JavaScript Symbols for Code Execution
Medium
Unveiling the Secrets of XSS Bypass: Harnessing JavaScript Symbols for Code Execution
Preface
hack and bug bounty
Hunting 10k Metabase hosts on the Internet
Medium
Hunting 10k Metabase hosts on the Internet
DISCLAIMER: The information provided here is only meant to be entertaining and educational.
hack and bug bounty
My Review: Burp Suite Certified Practitioner (BSCP)
Medium
My Review: Burp Suite Certified Practitioner (BSCP)
I’ve been preparing for the Burp Suite Certification Exam for the last two years, and I’m excited to share that I have now earned the…
hack and bug bounty
TryHackMe: Brooklyn Nine Nine Room Write-up
Medium
TryHackMe: Brooklyn Nine Nine Room Write-up
To access the box click on the following link and join room.
hack and bug bounty
Project 2510: Bug Bounty Challenge — Day 0/25
Medium
Project 2510: Bug Bounty Challenge — Day 0/25
Greetings, my name is Wallotry. That’s my hacker name, of course.
hack and bug bounty
Directory, File Brute-Forcing and Enumeration Using Gobuster
Medium
Directory, File Brute-Forcing and Enumeration Using Gobuster
This tutorial is for educational purposes only. Ethical hacking requires strict adherence to ethics, responsibility, and the law. Always…
hack and bug bounty
Cybersecurity And Much More Newsletter Vol. 3 Num. 19
Medium
Cybersecurity
🔐
And Much More Newsletter
📪
Vol. 3 Num. 19
Hey there,
👋
hack and bug bounty
Monitor your husband’s social media while you are in the beauty parlor
Medium
Monitor your husband’s social media while you are in the beauty parlor
Maintaining a healthy and trusting relationship is essential for its success. Trust, communication, and privacy are the cornerstones of a…
hack and bug bounty
Improving product reliability by imposing constraints as a part of CI/CD process
Medium
Improving product reliability by imposing constraints as a part of CI/CD process
At Revolut, we always aim to consistently provide efficient, high-quality, and secure services. Our primary goals are to enhance product…
hack and bug bounty
Weekly Standup — Filtering In SQL || Assets, Threats, and Vulnerabilities
Medium
Weekly Standup — Filtering In SQL || Assets, Threats, and Vulnerabilities
Hey, it’s great to be back for my weekly standups.