hack and bug bounty
@hack_com
21
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
21 subscribers
hack and bug bounty
SQL Injection: A Simple Beginner’s Guide.
Medium
SQL Injection: A Simple Beginner’s Guide.
Introduction
hack and bug bounty
Privilege Escalation by manipulating endpoint
Medium
Privilege Escalation by manipulating endpoint
Hello Jai Sia Ram Dosto,
Here is my first blog.
I have found the Privilege Escalation during pen-testing.
Sometime we have to focus on…
hack and bug bounty
Google Bug Hunters
Medium
Google Bug Hunters
In the realm of cybersecurity, where threats lurk around every virtual corner, organizations must deploy formidable defenses to safeguard…
hack and bug bounty
hello
Medium
hello
I need help finding a hidden channel on discord but how do I find it??? without application or website.. just with the inspector and…
hack and bug bounty
IDOR to make comment in user’s private posts
Medium
IDOR to make comment in user’s private posts
Hello hackers, today i will show you how i can make comments in any user’s private post with IDOR.
hack and bug bounty
Easy Money from the Most Trivially Easy Broken Access Control
Medium
Easy Money from the Most Trivially Easy Broken Access Control
Hello, I am Abda11aTarek. Some of my friends asks me about how I achieved a listing in the Top 10 on Bugcrowd’s leaderboard for P1 and P2…
hack and bug bounty
How To Find Orgin IP
Medium
How To Find Orgin IP
Hi, Today is We learn how to find Orgin IP.
hack and bug bounty
Useful tools for bug hunter
Medium
Useful tools for bug hunter
Bug Bounty tool List
hack and bug bounty
ACCOUNT TAKEOVER VIA RESET PASSWORD JWT
Medium
ACCOUNT TAKEOVER VIA RESET PASSWORD JWT
In the name of Allah, the Most Gracious, the Most Merciful.
hack and bug bounty
Unexpected $300 for a Clikjacking Bug
Medium
Unexpected $300 for a Clikjacking Bug
Summary
hack and bug bounty
Become a Successful Bug Hunter in 2023
Medium
Become a Successful Bug Hunter in 2023
Bug bounty hunting is a process in which individuals or organizations find and report security vulnerabilities in software, websites, or…
hack and bug bounty
How I found P2 bug in 5 mins
Medium
How I found P2 bug in 5 mins
Sensitive information disclosure
hack and bug bounty
Secure Node.js API Development: Top 10 Best Practices
Medium
Secure Node.js API Development: Top 10 Best Practices
Introduction
hack and bug bounty
Protecting API Keys 2024 Edition
Medium
Protecting API Keys 2024 Edition
Did you know that Flutter has an official publication on Medium? They do, it’s creatively named ‘Flutter’. Android has one too called…
hack and bug bounty
What is a Polymorphic Virus detection and best practices?
Medium
What is a Polymorphic Virus detection and best practices?
In the ever-evolving sphere of digital tech, the persistent threat of cyber intrusions remains a formidable concern. A notable example is…
hack and bug bounty
Secure Your Data: Masking Sensitive Information in Spring Boot APIs
Medium
Secure Your Data: Masking Sensitive Information in Spring Boot APIs
Say Goodbye to Exposed Data: Master Data Masking in Spring Boot
hack and bug bounty
Securing publicly accessible API endpoints
Medium
Securing publicly accessible API endpoints
In the era of digital transformation, building secure API endpoints is as crucial as locking your front door.
hack and bug bounty
Securing APIs from challenges of AI-generated bots and various security attacks.
Medium
Securing APIs from challenges of AI-generated bots and various security attacks.
API Security In today’s digital age, Application Programming Interfaces (APIs) are the linchpins of the interconnected online world…
hack and bug bounty
API Security Testing : An Overview by Abhishek Tamang
Medium
API Security Testing : An Overview by Abhishek Tamang
Introduction
hack and bug bounty
EP:39- A Guide to Rate Limiting and Throttling for Optimal Performance
Medium
EP:39- A Guide to Rate Limiting and Throttling for Optimal Performance
In the world of API management, maintaining a balance between performance and security is crucial. Rate limiting and throttling are key…
hack and bug bounty
Bluetooth hacking #3: Interacting with Bluetooth Low Energy Devices
Medium
Bluetooth hacking #3: Interacting with Bluetooth Low Energy Devices
Hello guys, my name is Sethu satheesh, i am a cyber security researcher and a software engineer. Welcome back to our third part of…