hack and bug bounty
@hack_com
21
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
21 subscribers
hack and bug bounty
“AI in Robotics A Glimpse into the Future of Automation”
Medium
“AI in Robotics A Glimpse into the Future of Automation”
The merger of Artificial Intelligence (AI) and robotics is revolutionizing automation and reshaping industries across the globe. As these…
hack and bug bounty
Cyber Briefing: 2023.11.06
Medium
Cyber Briefing: 2023.11.06
👉
What’s happening in cybersecurity today? Israeli Education and Tech Sectors Targeted, AsyncRAT’s Infection Chain, Kinsing Actors Exploit…
hack and bug bounty
Hunter Tools
Medium
Hunter Tools
Recentemente, criei um instalador que reúne uma ampla gama de ferramentas utilizadas em testes de segurança, incluindo Bug Bounty e…
hack and bug bounty
Domain of Thrones: Part II
Medium
Domain of Thrones: Part II
When Adversaries Play for Keeps
hack and bug bounty
Effective Bug Reporting: What to Include
Medium
Effective Bug Reporting: What to Include
Reporting a bug is not just about pointing out a flaw; it’s about providing the development team with the information they need to…
hack and bug bounty
Fixing the Apache ActiveMQ Remote Code Execution Vulnerability- CVE-2023–46604
Medium
Fixing the Apache ActiveMQ Remote Code Execution Vulnerability- CVE-2023–46604
Apache ActiveMQ is a popular open-source message broker software that enables asynchronous messaging between distributed systems and…
hack and bug bounty
The Potential of Elon Musk’s ‘Grok’: A Deep Dive into xAI’s Rebellious AI
Medium
The Potential of Elon Musk’s ‘Grok’: A Deep Dive into xAI’s Rebellious AI
In an ever-evolving landscape of artificial intelligence, Elon Musk’s latest venture, xAI, is making headlines with its groundbreaking…
hack and bug bounty
Ghost Recon OSINT Framework: Unleashing Tactical Intelligence Mastery
Medium
Ghost Recon OSINT Framework: Unleashing Tactical Intelligence Mastery
Welcome to our channel! In this video, we are thrilled to introduce you to the groundbreaking Ghost Recon OSINT Framework — an…
hack and bug bounty
Darkshell Dominion: Exploring the Art of Reverse Shell Generation
Medium
Darkshell Dominion: Exploring the Art of Reverse Shell Generation
Welcome to our video on “Darkshell Dominion: Exploring the Art of Reverse Shell Generation.” In this comprehensive tutorial, we delve into…
hack and bug bounty
Identify clickjacking vulnerability using ClickjackPoc
Medium
Identify clickjacking vulnerability using ClickjackPoc
Clickjacking (UI redressing)
hack and bug bounty
Ghauri’s SQL Injection Nightmare: Unveiling the Security Flaws
Medium
Ghauri’s SQL Injection Nightmare: Unveiling the Security Flaws
Do you want to learn how to hack into protected systems? Do you want to learn how to break into networks and steal data? In this video…
hack and bug bounty
Unveiling MStore API 3.9.9: Unauthenticated Privilege Escalation
Medium
Unveiling MStore API 3.9.9: Unauthenticated Privilege Escalation
Description
hack and bug bounty
OSCP Certification: Beginner to Advanced Cyber Security Course | Penetration Testing with Kali…
Medium
OSCP Certification: Beginner to Advanced Cyber Security Course | Penetration Testing with Kali…
Download OSCP Course Material for free HERE
hack and bug bounty
Vulnhub — DC-1
Medium
Vulnhub — DC-1
This is a VM that can be downloaded from Vulnhub and run locally.
hack and bug bounty
SEPPUKU WALKTHROUGH PROVING GROUNDS
Medium
SEPPUKU WALKTHROUGH PROVING GROUNDS
1)RECONNAISSANCE
hack and bug bounty
The scan is not enough: why combining scans and pentesting is the best approach to vulnerability…
Medium
The scan is not enough: why combining scans and pentesting is the best approach to vulnerability…
How do you know if your organization has control on its vulnerabilities? Easy, you just run a scan, and then submit the identified…
hack and bug bounty
Try Hack Me — Sakura — Walkthrough
Medium
Try Hack Me — Sakura — Walkthrough
TASK 1: Introduction
hack and bug bounty
Monitor Your Children When You Are in Your Office
Medium
Monitor Your Children When You Are in Your Office
Keeping a Watchful Eye on Your Kids from the Workplace
hack and bug bounty
Discovering and Exploiting a XML External Entity (XXE) Vulnerability in a Public Bug Bounty Program
Medium
Discovering and Exploiting a XML External Entity (XXE) Vulnerability in a Public Bug Bounty Program
Introduction
hack and bug bounty
Project 2510: Bug Bounty Challenge — Day 1/25
Medium
Project 2510: Bug Bounty Challenge — Day 1/25
Greetings, welcome to Day 1.
hack and bug bounty
How I sent multiple payment requests on PhonePe, Paytm, and Google Pay
Medium
PS: Just shared this write-up for Knowledge Purposes. So please be aware while exploiting it. Also, the bug has already been submitted…
Good day ppl! This is Anudeep Vysyaraju, with a new write-up on how I sent multiple payment requests to users on their PhonePe, Paytm, and Google Pay. Razorpay helps you accept online payments from…