hack and bug bounty
@hack_com
21
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
21 subscribers
hack and bug bounty
Penetration Testing Methodologies: An Overview
Medium
Penetration Testing Methodologies: An Overview
Introduction
hack and bug bounty
Project 2510: Bug Bounty Challenge — The End?
Medium
Project 2510: Bug Bounty Challenge — The End?
Greetings.
hack and bug bounty
How to exploit a CSRF
Medium
How to exploit a CSRF
Crafting a CSRF (Cross-Site Request Forgery) exploit within Bugcrowd’s labs involves navigating through simulated scenarios to understand…
hack and bug bounty
Handling security vulnerabilities in Spring Boot
Medium
Handling security vulnerabilities in Spring Boot
In the world of software development, managing dependencies is a core part of creating strong and secure applications. Spring Boot, a favorite among Java developers, makes building applications…
hack and bug bounty
Highest Paying cybersecurity jobs for the next decade
Medium
Highest Paying cybersecurity jobs for the next decade
Check out the top 8 cybersecurity occupations that will pay the most in the upcoming ten years.
In the rapidly developing technology…
hack and bug bounty
Stack zero buffer overflow
Medium
Stack zero buffer overflow
Welcome to an exploration of the Stack 0 Buffer Overflow challenge! In this walkthrough, we’ll unravel the intricacies of exploiting a…
hack and bug bounty
Exploring the Logic of XSS Attacks and Bypassing Techniques through Browser Decoding
Medium
Exploring the Logic of XSS Attacks and Bypassing Techniques through Browser Decoding
hack and bug bounty
In the diverse world of "parsing" vulnerabilities
Medium
In the diverse world of "parsing" vulnerabilities
What is parsing?
hack and bug bounty
HTB Walkthrough: Postman
Medium
HTB Walkthrough: Postman
Postman is a retired machine running on Linux. The whole deal kicks off with a misconfigured Redis service just waiting to be exploited…
hack and bug bounty
The Shocking Truth Behind Indicators of Compromise (IOCs) — You Won’t Believe What We Found!
Medium
The Shocking Truth Behind Indicators of Compromise (IOCs) — You Won’t Believe What We Found!
IOCs are artifacts or activities that indicate a system has been compromised or is under attack. IOCs are crucial for detecting and…
hack and bug bounty
Subdomain Enumeration Techniques
Medium
Subdomain Enumeration Techniques
What is sub-domain Enumeration?
hack and bug bounty
Day 11 Bug Bounty — 60 days 60 bugs challenge
Medium
Day 11 Bug Bounty — 60 days 60 bugs challenge
Hi there it’s cyberbeat again. This morning I got up around 5.30, realizing that I have to go for work. I’m learning to test applications…
hack and bug bounty
Network Managed Detection and Response (NMDR): Strengthening Cybersecurity Defenses
Medium
Network Managed Detection and Response (NMDR): Strengthening Cybersecurity Defenses
In an era marked by ever-evolving cyber threats, organizations are increasingly turning to advanced cybersecurity solutions to protect…
hack and bug bounty
What is SQL injection
Medium
What is SQL injection
hack and bug bounty
Cross-Site Scripting (XSS)
Medium
Cross-Site Scripting (XSS)
what is xss
hack and bug bounty
Sederhana tapi Bikin Marah, Trend yang Lagi Digandrungi Warga Twitter/X
Medium
Sederhana tapi Bikin Marah, Trend yang Lagi Digandrungi Warga Twitter/X
“Sederhana tapi bikin marah” adalah trend yang saat ini sedang viral di sosial media Twitter/X.
hack and bug bounty
Hello World
Medium
Hello World
Navigating the Cybersecurity Realm
hack and bug bounty
Ödeme sayfasında Business Logic
Medium
Ödeme sayfasında Business Logic
Herkese merhaba !
hack and bug bounty
Remote Code Execution (RCE)
Medium
Remote Code Execution (RCE)
Introduction
hack and bug bounty
Insecure Direct Object Reference(IDOR)
Medium
Insecure Direct Object Reference(IDOR)
What is IDOR
hack and bug bounty
“Highways and Hijacks Securing Transportation Infrastructure from Cyber Attacks”
Medium
“Highways and Hijacks Securing Transportation Infrastructure from Cyber Attacks”
In the interconnected landscape of modern transportation, where highways are the lifelines of commerce and connectivity, the specter of…