hack and bug bounty
@hack_com
21
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
21 subscribers
hack and bug bounty
Top 25 Advanced Google Dorks for OSINT and Bug Bounty Hunting
Medium
Top 25 Advanced Google Dorks for OSINT and Bug Bounty Hunting
Effective Techniques for Uncovering Information Security Vulnerabilities and Open-Source Intelligence.
hack and bug bounty
“From Farms to Forks Protecting Agriculture Infrastructure from Cyber Threats”
Medium
“From Farms to Forks Protecting Agriculture Infrastructure from Cyber Threats”
In the age of digital agriculture, where technology plays a vital role in modern farming practices, the protection of agriculture…
hack and bug bounty
Try Hack me — Advent Of Cyber 2023 Day 1 Write Up
Medium
Try Hack me — Advent Of Cyber 2023 Day 1 Write Up
Room: Advent of Cyber 2023 Day 1
hack and bug bounty
Learn Ethical Hacking for Free with SkillsForAll
Medium
Learn Ethical Hacking for Free with SkillsForAll
Cybersecurity is more important today than ever before. As companies and individuals rely more on technology and the internet for daily…
hack and bug bounty
Best Laptops for Pentesting for 2024
Medium
Best Laptops for Pentesting for 2024
Explore best Laptops for Cyber Security and Ethical Hacking
hack and bug bounty
Red Team Report Writing: Moving Past General Observations
Medium
Red Team Report Writing: Moving Past General Observations
When writing red team engagement reports, it’s relatively easy to explain what the team did, how they did it, and results of the actions…
hack and bug bounty
20 Days Of Hacking: Bug Bounty Challenge — Day 2
Medium
20 Days Of Hacking: Bug Bounty Challenge — Day 2
Welcome to Day 2(02/12/2023)
hack and bug bounty
Introducing HackGATE
™
: the industry’s first managed gateway for security testing
Medium
Introducing HackGATE
™
: the industry’s first managed gateway for security testing
Working with ethical hackers in penetration testing projects is a great way to strengthen your company’s security systems. However…
hack and bug bounty
How I Found My First Website Vulnerability as a Web Pentester
Medium
How I Found My First Website Vulnerability as a Web Pentester
Spoiler: XSS and SQL Injection
hack and bug bounty
My first and simple ATO in a private program
Medium
My first and simple ATO in a private program
Hello guys, I’m Pansa and I’m here to tell you about my first ATO bug. It was very easy to find.
hack and bug bounty
My Confusion Over Local File Inclusion
Medium
My Confusion Over Local File Inclusion
A poetic entry in the diary of a Bug Bounty Hunter…
hack and bug bounty
The Shocking Secrets Behind Foolproof Vulnerability Response!
Medium
The Shocking Secrets Behind Foolproof Vulnerability Response!
Vulnerability response refers to the systematic approach and processes that organizations implement to identify, assess, prioritize, and…
hack and bug bounty
The ONE Vulnerability Every Website Owner Fears — Learn How YOU Can Expose It!
Medium
The ONE Vulnerability Every Website Owner Fears — Learn How YOU Can Expose It!
In the rapidly evolving landscape of technology, the discovery and responsible disclosure of software vulnerabilities play a crucial role…
hack and bug bounty
InfoSecSherpa’s News Roundup for Saturday, December 2, 2023
Medium
InfoSecSherpa’s News Roundup for Saturday, December 2, 2023
InfoSecSherpa: Your Guide Up a Mountain of Information!
hack and bug bounty
Everything I know on Recon
Medium
Everything I know on Recon
Let me start this out by stating i am not an expert. However i do have some information about recon that i feel will benefit many people…
hack and bug bounty
Executing Shellcode in Remote Process
Medium
Executing Shellcode in Remote Process
Hello everyone I am Irfan and today, let’s delve into the topic of executing shellcode in Remote Process. So, let’s get started and explore…
hack and bug bounty
Walmart Joins Growing Exodus From Elon Musk’s X As Advertisers Raise Concerns Over Hate Speech.
Medium
Walmart Joins Growing Exodus From Elon Musk’s X As Advertisers Raise Concerns Over Hate Speech.
In the latest turn of events, retail giant Walmart has publicly declared its decision to halt advertising spending on X, Elon Musk’s social…
hack and bug bounty
My First Valid Bug!!!
Medium
My First Valid Bug!!!
Hey Everyone! Today I am going to share my experience of the first valid bug that I found. So let’s dive into it.
hack and bug bounty
Phoneinfoga: A phone number OSINT framework | Day15 of 30DaysOfOSINT
Medium
Phoneinfoga: A phone number OSINT framework | Day15 of 30DaysOfOSINT
The main aim of writing this blog is to get you all familiar with Phoneinfoga, its features, its use cases, and its working.
hack and bug bounty
Cyber Resilience in Industrial Control Systems Protecting Manufacturing Infrastructure”
Medium
Cyber Resilience in Industrial Control Systems Protecting Manufacturing Infrastructure”
In the heart of modern manufacturing facilities, Industrial Control Systems (ICS) orchestrate the intricate dance of machines and processes…
hack and bug bounty
“Bridging the Gaps Cybersecurity Challenges in Critical Infrastructure Supply Chains”
Medium
“Bridging the Gaps Cybersecurity Challenges in Critical Infrastructure Supply Chains”
The intricate web of critical infrastructure supply chains forms the backbone of modern societies, ensuring the continuous flow of…