hack and bug bounty
@hack_com
21
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
21 subscribers
hack and bug bounty
A Comprehensive Guide to Detecting and Preventing SQL Injection Vulnerabilities
Medium
A Comprehensive Guide to Detecting and Preventing SQL Injection Vulnerabilities
SQL injection is a type of attack that occurs when an attacker inserts malicious SQL code into a web application’s input fields, tricking…
hack and bug bounty
I WANT TO HIRE A HACKER TO TRACK MY A STALKER / MISSING CELL PHONE
Medium
I WANT TO HIRE A HACKER TO TRACK MY A STALKER / MISSING CELL PHONE
In this day and time, stalkers or thieves who stalk offline are using technology to assist their behaviours for example, mobile phones, social media, computers, and geolocation tracking. This has…
hack and bug bounty
DRIFTING BLUES 6 WALKTHROUGH PROVING GROUNDS PLAY
Medium
DRIFTING BLUES 6 WALKTHROUGH PROVING GROUNDS PLAY
1)RECONNAISSANCE
hack and bug bounty
Empowering the $X Project with Artificial Intelligence: A Game-Changing Integration
Medium
Empowering the $X Project with Artificial Intelligence: A Game-Changing Integration
At the heart of the $X Project’s strategy and development lies an ambitious endeavor: integrating Artificial Intelligence (AI) into our…
hack and bug bounty
Zero to Hero Burp Suite Extension
Medium
Zero to Hero Burp Suite Extension
Web application security testing is of paramount importance in today’s digital world. Services and applications offered on the internet can…
hack and bug bounty
Mastering Cybersecurity: A Comprehensive Guide to Cybersecurity Certification
Medium
Mastering Cybersecurity: A Comprehensive Guide to Cybersecurity Certification
In an era dominated by digital advancements and interconnected systems, the need for robust cybersecurity measures has never been more…
hack and bug bounty
Is Cybersecurity Jobs Overcrowded in 2023? (My Current Situation)
Medium
Is Cybersecurity Jobs Overcrowded in 2023? (My Current Situation
😭
)
Hi, Ajak Amico’s welcome back to another blog. As I mentioned in the previous blog, I am currently searching for jobs in the UK for…
hack and bug bounty
TryHackMe-Alfred(WriteUp)
Medium
TryHackMe-Alfred(WriteUp)
Greetings People! I hope you’re all doing great. Another one in the writeups list after so long.
hack and bug bounty
CAPen Mock Exam Writeup
Medium
CAPen Mock Exam Writeup
There are four questions. They weren’t difficult, but I gained something interesting that I’d want to share, so let’s get started with the…
hack and bug bounty
Basic Bug Bounty Strategy
Medium
Basic Bug Bounty Strategy
Cross-Site Scripting (XSS)
hack and bug bounty
20.2 Lab: Host header authentication bypass | 2023
Medium
20.2 Lab: Host header authentication bypass | 2023
This lab makes an assumption about the privilege level of the user based on the HTTP Host header. To solve the lab, access the admin panel…
hack and bug bounty
ReversingLabs TitaniumCloud for Splunk SOAR Updates — v1.2.0
Medium
ReversingLabs TitaniumCloud for Splunk SOAR Updates — v1.2.0
Version 1.2.0 of ReversingLabs’ TitaniumCloud v2 app for Splunk SOAR adds new actions for network reputation lookups.
hack and bug bounty
Cybersecurity Top World Headlines ️
Medium
Cybersecurity Top World Headlines
📰
🛡️
Top cybersecurity headlines from around the globe
hack and bug bounty
Cyber Briefing: 2023.11.08
Medium
Cyber Briefing: 2023.11.08
👉
What’s trending in cybersecurity today?
hack and bug bounty
How to Get Free Cyber Security Experience from Top Companies
Medium
How to Get Free Cyber Security Experience from Top Companies
If you’re struggling to land your first cyber security role because companies are asking for so much experience that you don’t have, there…
hack and bug bounty
Navigating Cloud and Application Security: Insights from the Gartner Security and Risk Management…
Medium
Navigating Cloud and Application Security: Insights from the Gartner Security and Risk Management Summit
At the recent Gartner Security and Risk Management Summit in London, executives and business technologists converged to tackle the…
hack and bug bounty
TryHackMe ‑ Basic Pentesting Room Writeup
Medium
TryHackMe ‑ Basic Pentesting Room Writeup
Challenge description: This challenge helps you apply basic enumeration and privilege escalation techniques to network protocols, as well…
hack and bug bounty
When Collaboration Becomes Vulnerable: Exposing SQL Injection
Medium
When Collaboration Becomes Vulnerable: Exposing SQL Injection
In an era where collaboration is key to business agility, a popular document collaboration tool had its security compromised.
hack and bug bounty
Me, Myself & I
Medium
Me, Myself & I
Get to know me better
hack and bug bounty
Deep Diving into CVE-2023–46298: Resource Exhaustion in Next.js
Medium
Deep Diving into CVE-2023–46298: Resource Exhaustion in Next.js
Hi Everyone, today I will do a bit of a different blog, which will be about my research on CVE-2023–46298, which was classified by Snyk as…
hack and bug bounty
The Empty Promise of a JavaScript “Bypass”: A Developer’s Perspective
Medium
The Empty Promise of a JavaScript “Bypass”: A Developer’s Perspective
I recently encountered an interesting sales pitch that caught my attention, not for its ingenuity, but for its bold inaccuracy. I was…