hack and bug bounty
@hack_com
21
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
21 subscribers
hack and bug bounty
Introducing HackGATE
™
: the industry’s first managed gateway for security testing
Medium
Introducing HackGATE
™
: the industry’s first managed gateway for security testing
Working with ethical hackers in penetration testing projects is a great way to strengthen your company’s security systems. However…
hack and bug bounty
How I Found My First Website Vulnerability as a Web Pentester
Medium
How I Found My First Website Vulnerability as a Web Pentester
Spoiler: XSS and SQL Injection
hack and bug bounty
My first and simple ATO in a private program
Medium
My first and simple ATO in a private program
Hello guys, I’m Pansa and I’m here to tell you about my first ATO bug. It was very easy to find.
hack and bug bounty
My Confusion Over Local File Inclusion
Medium
My Confusion Over Local File Inclusion
A poetic entry in the diary of a Bug Bounty Hunter…
hack and bug bounty
The Shocking Secrets Behind Foolproof Vulnerability Response!
Medium
The Shocking Secrets Behind Foolproof Vulnerability Response!
Vulnerability response refers to the systematic approach and processes that organizations implement to identify, assess, prioritize, and…
hack and bug bounty
The ONE Vulnerability Every Website Owner Fears — Learn How YOU Can Expose It!
Medium
The ONE Vulnerability Every Website Owner Fears — Learn How YOU Can Expose It!
In the rapidly evolving landscape of technology, the discovery and responsible disclosure of software vulnerabilities play a crucial role…
hack and bug bounty
InfoSecSherpa’s News Roundup for Saturday, December 2, 2023
Medium
InfoSecSherpa’s News Roundup for Saturday, December 2, 2023
InfoSecSherpa: Your Guide Up a Mountain of Information!
hack and bug bounty
Everything I know on Recon
Medium
Everything I know on Recon
Let me start this out by stating i am not an expert. However i do have some information about recon that i feel will benefit many people…
hack and bug bounty
Executing Shellcode in Remote Process
Medium
Executing Shellcode in Remote Process
Hello everyone I am Irfan and today, let’s delve into the topic of executing shellcode in Remote Process. So, let’s get started and explore…
hack and bug bounty
Walmart Joins Growing Exodus From Elon Musk’s X As Advertisers Raise Concerns Over Hate Speech.
Medium
Walmart Joins Growing Exodus From Elon Musk’s X As Advertisers Raise Concerns Over Hate Speech.
In the latest turn of events, retail giant Walmart has publicly declared its decision to halt advertising spending on X, Elon Musk’s social…
hack and bug bounty
My First Valid Bug!!!
Medium
My First Valid Bug!!!
Hey Everyone! Today I am going to share my experience of the first valid bug that I found. So let’s dive into it.
hack and bug bounty
Phoneinfoga: A phone number OSINT framework | Day15 of 30DaysOfOSINT
Medium
Phoneinfoga: A phone number OSINT framework | Day15 of 30DaysOfOSINT
The main aim of writing this blog is to get you all familiar with Phoneinfoga, its features, its use cases, and its working.
hack and bug bounty
Cyber Resilience in Industrial Control Systems Protecting Manufacturing Infrastructure”
Medium
Cyber Resilience in Industrial Control Systems Protecting Manufacturing Infrastructure”
In the heart of modern manufacturing facilities, Industrial Control Systems (ICS) orchestrate the intricate dance of machines and processes…
hack and bug bounty
“Bridging the Gaps Cybersecurity Challenges in Critical Infrastructure Supply Chains”
Medium
“Bridging the Gaps Cybersecurity Challenges in Critical Infrastructure Supply Chains”
The intricate web of critical infrastructure supply chains forms the backbone of modern societies, ensuring the continuous flow of…
hack and bug bounty
“Protecting National Identity Cybersecurity Measures in Government Infrastructure”
Medium
“Protecting National Identity Cybersecurity Measures in Government Infrastructure”
In an era where nations rely heavily on digital technologies to govern, communicate, and provide services to citizens, the protection of…
hack and bug bounty
“The Backbone of Connectivity Cybersecurity Measures for Internet Infrastructure”
Medium
“The Backbone of Connectivity Cybersecurity Measures for Internet Infrastructure”
In the ever-evolving landscape of digital communication, the internet serves as the backbone of connectivity, facilitating the seamless…
hack and bug bounty
Nmap Host Discovery: Explore the Network Maze
Medium
Nmap Host Discovery: Explore the Network Maze
Embark on a journey of network exploration with Nmap, the ultimate tool for uncovering hidden hosts and mapping the digital landscape.
hack and bug bounty
“Safeguarding the Skies Cyber Threats to Air Traffic Control Infrastructure”
Medium
“Safeguarding the Skies Cyber Threats to Air Traffic Control Infrastructure”
In the modern era, air travel has become an integral part of global connectivity, with air traffic control (ATC) infrastructure serving as…
hack and bug bounty
3 Types Of Penetration Testing In Ethical Hacking
Medium
3 Types Of Penetration Testing In Ethical Hacking
In the ever-evolving landscape of cybersecurity, penetration testing stands as a crucial line of defense against potential threats. Also…
hack and bug bounty
The Ultimate Ethical Hacking Roadmap: A Comprehensive Guide
Medium
The Ultimate Ethical Hacking Roadmap: A Comprehensive Guide
Ethical hacking, also known as penetration testing or white-hat hacking, plays a crucial role in securing digital systems and networks. As…
hack and bug bounty
I was able to Exploit a company data 30 years sales record | Real Hacking |
Medium
I was able to Exploit a company data 30 years sales record | Real Hacking |
This is the fourth exploit of my life and one that is going to give me a new job