hack and bug bounty
@hack_com
21
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
21 subscribers
hack and bug bounty
IWCON 2023 CTF Registrations Now Open
Medium
IWCON 2023 CTF Registrations Now Open
Register today!
hack and bug bounty
Fat GET Authorization Bypass
Medium
Fat GET Authorization Bypass
I was testing a SaaS web application that would generate reports with user data. There were a number of different reports for users roles…
hack and bug bounty
5+All Security Resource Digest for 2023–11–29
Medium
5+All Security Resource Digest for 2023–11–29
Here are my favorite 5 security resources added to my security resource database since yesterday. These resources will range from blogs and Reddit posts, through paid resource subscriptions and…
hack and bug bounty
Cyber Briefing: 2023.11.29
Medium
Cyber Briefing: 2023.11.29
👉
What’s trending in cybersecurity today?
hack and bug bounty
2023's Top Cybersecurity Threats: Navigating the Digital Minefield ️♂️
Medium
2023's Top Cybersecurity Threats: Navigating the Digital Minefield
🔒
💻
🕵️♂️
Most critical cybersecurity threats of 2023
hack and bug bounty
Cracking An SHA-256 Hash With JohnTheRipper
Medium
Cracking An SHA-256 Hash With JohnTheRipper
Introduction
hack and bug bounty
Top 25 Advanced Google Dorks for Uncovering Sensitive Documents
Medium
Top 25 Advanced Google Dorks for Uncovering Sensitive Documents
Efficient Techniques for Investigating Confidential Files and Documents
hack and bug bounty
InfoSecSherpa’s News Roundup for Wednesday, November 29, 2023
Medium
InfoSecSherpa’s News Roundup for Wednesday, November 29, 2023
InfoSecSherpa: Your Guide Up a Mountain of Information!
hack and bug bounty
Evading Detection With Nmap Part 2
Medium
Evading Detection With Nmap Part 2
Analyzing how Nmap -sV probes give your assessment away
hack and bug bounty
Penetration Testing Methodologies: An Overview
Medium
Penetration Testing Methodologies: An Overview
Introduction
hack and bug bounty
Project 2510: Bug Bounty Challenge — The End?
Medium
Project 2510: Bug Bounty Challenge — The End?
Greetings.
hack and bug bounty
How to exploit a CSRF
Medium
How to exploit a CSRF
Crafting a CSRF (Cross-Site Request Forgery) exploit within Bugcrowd’s labs involves navigating through simulated scenarios to understand…
hack and bug bounty
Handling security vulnerabilities in Spring Boot
Medium
Handling security vulnerabilities in Spring Boot
In the world of software development, managing dependencies is a core part of creating strong and secure applications. Spring Boot, a favorite among Java developers, makes building applications…
hack and bug bounty
Highest Paying cybersecurity jobs for the next decade
Medium
Highest Paying cybersecurity jobs for the next decade
Check out the top 8 cybersecurity occupations that will pay the most in the upcoming ten years.
In the rapidly developing technology…
hack and bug bounty
Stack zero buffer overflow
Medium
Stack zero buffer overflow
Welcome to an exploration of the Stack 0 Buffer Overflow challenge! In this walkthrough, we’ll unravel the intricacies of exploiting a…
hack and bug bounty
Exploring the Logic of XSS Attacks and Bypassing Techniques through Browser Decoding
Medium
Exploring the Logic of XSS Attacks and Bypassing Techniques through Browser Decoding
hack and bug bounty
In the diverse world of "parsing" vulnerabilities
Medium
In the diverse world of "parsing" vulnerabilities
What is parsing?
hack and bug bounty
HTB Walkthrough: Postman
Medium
HTB Walkthrough: Postman
Postman is a retired machine running on Linux. The whole deal kicks off with a misconfigured Redis service just waiting to be exploited…
hack and bug bounty
The Shocking Truth Behind Indicators of Compromise (IOCs) — You Won’t Believe What We Found!
Medium
The Shocking Truth Behind Indicators of Compromise (IOCs) — You Won’t Believe What We Found!
IOCs are artifacts or activities that indicate a system has been compromised or is under attack. IOCs are crucial for detecting and…
hack and bug bounty
Subdomain Enumeration Techniques
Medium
Subdomain Enumeration Techniques
What is sub-domain Enumeration?
hack and bug bounty
Day 11 Bug Bounty — 60 days 60 bugs challenge
Medium
Day 11 Bug Bounty — 60 days 60 bugs challenge
Hi there it’s cyberbeat again. This morning I got up around 5.30, realizing that I have to go for work. I’m learning to test applications…