hack and bug bounty
@hack_com
21
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
21 subscribers
hack and bug bounty
Subdomain takeover and Text injection on a 404 error page-$100 bounty
Medium
Subdomain takeover and Text injection on a 404 error page-$100 bounty
Hello everyone! I’m Jeewan Bhatta and I am here with my first hackerone bug write-up. Hope you all are doing great. So now I am gonna tell…
hack and bug bounty
Attention Cyber Enthusiasts! Exciting News Ahead! ️
Medium
🔍
🐞
Attention Cyber Enthusiasts! Exciting News Ahead!
🚀
🛡️
Hey, fellow code hunters!
🕵️♂️
💻
hack and bug bounty
Windows Privilege Escalation : AlwaysInstallElevated
Medium
Windows Privilege Escalation : AlwaysInstallElevated
AlwaysInstallElevated, when set to true, grants applications elevated privileges during installation, enabling them to make system-wide…
hack and bug bounty
Abusing services using SVG files: Part 1. Anatomy of an svg
Medium
Abusing services using SVG files: Part 1. Anatomy of an svg
This is a 4 part series based on a vulnerability I wrote a detailed, step-by-step exploitation instructions in an internal comms channel. I…
hack and bug bounty
“The Marriage of Data Science and IoT A Technological Symphony”
Medium
“The Marriage of Data Science and IoT A Technological Symphony”
In the age of interconnected devices and boundless data, the convergence of Data Science and the Internet of Things (IoT) is giving rise to…
hack and bug bounty
“Climate Change Modeling Using Data Science to Save the Planet”
Medium
“Climate Change Modeling Using Data Science to Save the Planet”
As the specter of climate change looms over our planet, the urgency to understand and mitigate its impact has never been greater. In this…
hack and bug bounty
“Natural Language Processing Understanding the Power of Words in Data”
Medium
“Natural Language Processing Understanding the Power of Words in Data”
In a world inundated with vast amounts of textual information, the ability to decipher, analyze, and derive meaningful insights from…
hack and bug bounty
“Quantum Computing and Data Science A Glimpse into the Future”
Medium
“Quantum Computing and Data Science A Glimpse into the Future”
As we stand on the cusp of a new era in computing, the marriage of Quantum Computing and Data Science promises to reshape the boundaries of…
hack and bug bounty
HackTheBox-Analytics(WriteUp)
Medium
HackTheBox-Analytics(WriteUp)
Hello World! I hope you are all doing great. Wishing you the happiest Diwali ever. My first non-guided HTB machine. Let’s GOOOOO!
hack and bug bounty
Unleashing the Power of Responder: An In-Depth Guide to a Versatile Ethical Hacking Tool
Medium
Unleashing the Power of Responder: An In-Depth Guide to a Versatile Ethical Hacking Tool
Introduction:
hack and bug bounty
Authentication Vulnerabilities- Lab #5 Username enumeration via response timing
Medium
Authentication Vulnerabilities- Lab #5 Username enumeration via response timing
For any correction / query /suggestion contact on Instagram dollarboysushil Twitter (X) dollarboysushil Youtube dollarboysushil
hack and bug bounty
AppSec Tales XXII | LDAPI
Medium
AppSec Tales XXII | LDAPI
Application Security Testing for LDAP Injections.
hack and bug bounty
JWT attack vulnerabilities in Web App Penetration Testing | 2023
Medium
JWT attack vulnerabilities in Web App Penetration Testing | 2023
In this section, we’ll explain what an JWT Attack is, describe some types, explain how to find and exploit JWT, and summarize how to…
hack and bug bounty
Catch Your Cheating Spouse Through Instagram in Your Travel Time
Medium
Catch Your Cheating Spouse Through Instagram in Your Travel Time
In the age of digital communication, Instagram has become more than just a platform for sharing photos and videos; it’s a hub for…
hack and bug bounty
“Text Mining and Sentiment Analysis Decoding the Language of the Internet”
Medium
“Text Mining and Sentiment Analysis Decoding the Language of the Internet”
In the vast expanse of the digital realm, where words flow ceaselessly, the ability to decipher and understand the sentiments behind text…
hack and bug bounty
Downloading files using POST request (unorthodox method)
Medium
Downloading files using POST request (unorthodox method)
Downloading a file using a POST request is less common than using a GET request, but it is technically possible. The HTTP/1.1 specification…
hack and bug bounty
Authentication Vulnerabilities- Lab #6 Broken brute-force protection, IP block
Medium
Authentication Vulnerabilities- Lab #6 Broken brute-force protection, IP block
For any correction / query /suggestion contact on Instagram dollarboysushil Twitter (X) dollarboysushil Youtube dollarboysushil
hack and bug bounty
Reconnaissance Is The Key — Bug Bounty Tip!
Medium
Reconnaissance Is The Key — Bug Bounty Tip!
Reconnaissance, or information gathering, is a crucial phase in finding vulnerabilities because it lays the foundation for a successful…
hack and bug bounty
Unveiling the Nahk Security Engineer: ChatGPT
Medium
Unveiling the Nahk Security Engineer: ChatGPT
Welcome to the world of Nahk Security Engineer, where cybersecurity meets clarity in communication. This blog delves into the comprehensive…
hack and bug bounty
How does DNS work?
Medium
How does DNS work?
Have you ever wondered how your web browser magically finds the websites you want, even though you only type in easy-to-remember names like…
hack and bug bounty
Pentesting: I wanna be a hackerrr…
Medium
Pentesting: I wanna be a hackerrr…
No, it’s not about testing writing pens/pencils. It’s harder than that.