hack and bug bounty
@hack_com
21
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
21 subscribers
hack and bug bounty
How to Bypass Windows User Account Control
Medium
How to Bypass Windows User Account Control
UAC, short for “User Account Control,” is a Windows security feature. The User Account Control (UAC) feature first appeared in Windows…
hack and bug bounty
The great chain of duplicates. Utilizing Javascript and Logic in the bug bounty field.
Medium
The great chain of duplicates. Utilizing Javascript and Logic in the bug bounty field.
Hi, in this blog I’ll walk you through how analysing javascript files and chaining bugs made me so close to get some bounties. This might be a long blog but i’ll try to split it into several points/…
hack and bug bounty
Passing The eWPTv2 Cybersecurity Exam as a 14-year-old.
Medium
Passing The eWPTv2 Cybersecurity Exam as a 14-year-old.
Background
hack and bug bounty
Elon Musk shows product of his AI company: ‘sarcastic’ chatbot
Medium
Elon Musk shows product of his AI company: ‘sarcastic’ chatbot
Elon Musk has taken a look at his company X AI’s latest product: an advanced AI chatbot, similar to ChatGPT.
hack and bug bounty
XSS Attacks: advanced techniques to bypass data sanitization
Medium
XSS Attacks: advanced techniques to bypass data sanitization
Disclaimer: this tutorial is for education purposes only. I am not liable if you do something illegal with these techniques. I just think…
hack and bug bounty
Understanding the Basics of Port Scanning and Hunting for Suspicious Port Activities
Medium
Understanding the Basics of Port Scanning and Hunting for Suspicious Port Activities
Understanding the basics of port scanning and proactively hunting for suspicious port activities are crucial components of safeguarding…
hack and bug bounty
Python Libraries and Frameworks Specifically Designed for Cybersecurity
Medium
Python Libraries and Frameworks Specifically Designed for Cybersecurity
Python is a powerful programming language that has made significant inroads into the field of cybersecurity. Its simplicity and rich…
hack and bug bounty
Fortifying Applications: A Guide to Modern Application Security
Medium
Fortifying Applications: A Guide to Modern Application Security
Introduction
hack and bug bounty
Nessus Essentials Lab: Technical Walkthrough
Medium
Nessus Essentials Lab: Technical Walkthrough
Nessus Essentials Lab: Vulnerability Management
hack and bug bounty
Setting Up a Private Burp Collaborator Server on Google Cloud Platform
Medium
Setting Up a Private Burp Collaborator Server on Google Cloud Platform
A Guide for Deploying a Private Burp Collaborator Server on GCP
hack and bug bounty
Unmasking the Pentester Club: Exploring CEH v12 Footprinting & Reconnaissance Secrets
Medium
Unmasking the Pentester Club: Exploring CEH v12 Footprinting & Reconnaissance Secrets
In this highly informative video, join Pentester Club as we delve into the realm of Footprinting and Reconnaissance, uncovering the secrets…
hack and bug bounty
Complete CEH v12 Labs Setup Guide: Join the Pentester Club!
Medium
Complete CEH v12 Labs Setup Guide: Join the Pentester Club!
Welcome to the ultimate CEH v12 Labs Setup Guide! In this video, we are excited to show you how to join the prestigious Pentester Club by…
hack and bug bounty
Unleashing the Power of SSH Harvester Penetration Testing
Medium
Unleashing the Power of SSH Harvester Penetration Testing
Welcome to our YouTube video on “Unveiling OpenSSH Security Risks: Automating Password Harvesting”. In this eye-opening presentation, we…
hack and bug bounty
NucleiFuzzer: Automating XSS Detection for Unrivaled Security
Medium
NucleiFuzzer: Automating XSS Detection for Unrivaled Security
In this video, we introduce NucleiFuzzer, an exceptionally powerful automation tool designed specifically for detecting cross-site…
hack and bug bounty
Exploring the Untapped Realm: Google Dorking Unveiled
Medium
Exploring the Untapped Realm: Google Dorking Unveiled
In this captivating video, dive deep into the fascinating world of “Google Dorking” as we unveil the incredible secrets hidden within the…
hack and bug bounty
Log4J Penetration Testing: The Ultimate Guide for Mastery
Medium
Log4J Penetration Testing: The Ultimate Guide for Mastery
In this comprehensive guide, we delve into the world of Log4J penetration testing, providing you with a detailed walkthrough to master this…
hack and bug bounty
Cracking the Code: Mastering Kaboom’s Penetration Testing Techniques
Medium
Cracking the Code: Mastering Kaboom’s Penetration Testing Techniques
In this comprehensive guide to penetration testing techniques, we delve into the power of Kaboom and explore how to unleash its full…
hack and bug bounty
Mastering Cybersecurity Challenges: MAL: Strings TryHackMe Walkthrough
Medium
Mastering Cybersecurity Challenges: MAL: Strings TryHackMe Walkthrough
Welcome to the official walkthrough for “MAL: Strings TryHackMe”! In this educational video, we delve into the techniques and strategies…
hack and bug bounty
Unlocking Kali Linux’s Hidden Arsenal: The Ultimate Power User’s Repository!
Medium
Unlocking Kali Linux’s Hidden Arsenal: The Ultimate Power User’s Repository!
Welcome to our YouTube channel! In this video, we present the ultimate repository for power users of Kali Linux: “Unleashing Hidden Kali…
hack and bug bounty
Penetration Testing On Voip Asterisk Server
Medium
Penetration Testing On Voip Asterisk Server
In this informative video, we delve into the crucial topic of securing your VoIP Asterisk server through effective penetration testing and…