hack and bug bounty
@hack_com
21
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
21 subscribers
hack and bug bounty
Vulnerability Management with DefectDojo — is it great for DevSecOps?
Medium
Vulnerability Management with DefectDojo — is it great for DevSecOps?
Presenting capabilities of DefectDojo in context of Vulnerability Management for DevSecOps and traditional application security engineers.
hack and bug bounty
Javascript Analysis to SQL injection
Medium
Javascript Analysis to SQL injection
Hi Hackers, I’m Mostafa Elguerdawi.
hack and bug bounty
Defending Your Digital Fortress: Cloaked Wireless’s Unrivaled Shield Against SIM Swap Attacks
Medium
Defending Your Digital Fortress: Cloaked Wireless’s Unrivaled Shield Against SIM Swap Attacks
In the ever-evolving landscape of digital threats, SIM swap attacks have emerged as a significant concern, posing risks to user accounts…
hack and bug bounty
Guarding the Titans: Rising SIM Swap Attacks on Prominent Figures on Social Media
Medium
Guarding the Titans: Rising SIM Swap Attacks on Prominent Figures on Social Media
In the ever-expanding digital landscape, the rise of SIM swap attacks has become a formidable threat, particularly targeting vocal…
hack and bug bounty
web vulnerabilities scan with WMAP
Medium
web vulnerabilities scan with WMAP
WMAP (Web Application Mapping and Penetration Testing) is a module within the Metasploit Framework that is used to identify and exploit…
hack and bug bounty
Proving Grounds Practice — Billyboss
Medium
Proving Grounds Practice — Billyboss
This is an intermediate box on Offsec’s PG Practice but the community has rated it ‘Very Hard’.
hack and bug bounty
Try Hack me— Advent Of Cyber 2023 Day 4 Write Up — Baby, it’s CeWLd outside
Medium
Try Hack me— Advent Of Cyber 2023 Day 4 Write Up — Baby, it’s CeWLd outside
Room: Advent of Cyber 2023 Day 4
hack and bug bounty
Bug Hunter journal day #3 and #4
Medium
Bug Hunter journal day #3 and #4
Within the massive list of subdomains for my target, as mentioned earlier, I found some WordPress sites. even stumbled upon that CVE for user enumeration, but by now, it’s likely already been…
hack and bug bounty
SSL-Stripping Demonstration and Mitigation
Medium
SSL-Stripping Demonstration and Mitigation
Demonstration of SSL stripping and how to mitigate it by setting Strict Transport Security.
hack and bug bounty
Reconciling “Secure by Design” With National Security, According to CISA’s Eric Goldstein
Medium
Reconciling “Secure by Design” With National Security, According to CISA’s Eric Goldstein
How CISA’s “secure by design” is NOT hypocritical, despite agencies hording zero days — and what the campaign is REALLY trying to do.
hack and bug bounty
From Applicant to CyberGirl: My Journey To Securing The Prestigious Scholarship
Medium
From Applicant to CyberGirl: My Journey To Securing The Prestigious Scholarship
Today, I’m not just sharing my experience, I’m equipping you with the tools and insights to forge your own path to becoming a CyberGirl.
hack and bug bounty
How I paid my Vehicle e-challans on the AP e-challan website for FREE
Medium
How I paid my Vehicle e-challans on the AP e-challan website for FREE
🆓
😁
Good day ppl! This is Anudeep Vysyaraju, came up with a new write-up on How I paid my vehicle e-challans on the AP e-challan website for…
hack and bug bounty
Web Enumeration With Gobuster
Medium
Web Enumeration With Gobuster
Hello everyone, today I will be teaching you how to enumerate files and directories of a web server using Gobuster. This is one of the…
hack and bug bounty
Advent of Cyber 2023: Day2 — O Data, All Ye Faithful (No Answers)
Medium
Advent of Cyber 2023: Day2 — O Data, All Ye Faithful (No Answers)
Welcome back to Day 2 of TryHackMe’s Advent of Cyber 2023! Today, we’re diving into the world of log analysis using Jupyter Notebooks…
hack and bug bounty
InfoSecSherpa’s News Roundup for Monday, December 4, 2023
Medium
InfoSecSherpa’s News Roundup for Monday, December 4, 2023
InfoSecSherpa: Your Guide Up a Mountain of Information!
hack and bug bounty
Account Takeover in Canvas Apps served in Comet due to failure in Cross-Window-Message Origin validation
hack and bug bounty
DOM-XSS in Instant Games due to improper verification of supplied URLs
hack and bug bounty
DOM-XSS in Instant Games due to improper verification of supplied URLs
hack and bug bounty
Account takeover of Facebook/Oculus accounts due to First-Party access_token stealing
hack and bug bounty
Account takeover of Facebook/Oculus accounts due to First-Party access_token stealing
hack and bug bounty
Multiple bugs chained to takeover Facebook Accounts which uses Gmail.