hack and bug bounty
@hack_com
21
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
21 subscribers
hack and bug bounty
PROVING GROUNDS — FUNBOX
Medium
PROVING GROUNDS — FUNBOX
Nmap scan:
hack and bug bounty
Disruption, disruption, disruption
Medium
Disruption, disruption, disruption
A future spearheaded by Meta & X
hack and bug bounty
Capturing User Data in Web Pentesting Applications — 10 | 2023
Medium
Capturing User Data in Web Pentesting Applications — 10 | 2023
Unveiling the World of Browser Extension Technologies and Their Impact on Web Security | Karthikeyan Nagaraj
hack and bug bounty
TryHackMe — Simple CTF
Medium
TryHackMe — Simple CTF
This will be a walk-through on the Simple CTF from TryHackMe. This is a beginner CTF designed to start getting you thinking about your…
hack and bug bounty
Elon Musk’s Transformation of Twitter
Medium
Elon Musk’s Transformation of Twitter
Revolutionizing Social Media for the Better.
hack and bug bounty
Twitter’s New “X” Logo — First one-letter iPhone app
Medium
Twitter’s New “X” Logo — First one-letter iPhone app
Let’s Talk This Out
hack and bug bounty
Unexpected $300 for a Clikjacking Bug
Medium
Unexpected $300 for a Clikjacking Bug
Summary
hack and bug bounty
TryHackMe- Red Walkthrough
Medium
TryHackMe- Red Walkthrough
Hey everyone. Recently I attempted the Red machine from Tryhackme. In this box, the initial foothold was achieved through a LFI…
hack and bug bounty
The Ultimate Guide to AhMyth Android Rat: Unleash Remote Access Tool Power!
Medium
The Ultimate Guide to AhMyth Android Rat: Unleash Remote Access Tool Power!
Welcome to “The Ultimate Guide to AhMyth Android Rat: Unleashing the Power of Remote Access Tools!” This comprehensive video tutorial…
hack and bug bounty
TWITTER is now X.
Medium
TWITTER is now X.
A few days ago, Elon Musk announced that Twitter would now be ‘X’. The iconic bird logo has been replaced with X and the official twitter…
hack and bug bounty
AWS Pentest — Cloudgoat: Scenario 1 (vulnerable_lambda)
Medium
AWS Pentest — Cloudgoat: Scenario 1 (vulnerable_lambda)
Let’s talk about the AWS Penetration Testing today. This will be a series of scenarios provided by the CloudGoat vulnerable AWS…
hack and bug bounty
HTB — Tally | 37/100
Medium
HTB — Tally | 37/100
Hi! Here is a technical writeup of the machine Tally from HackTheBox. This a Hard rated machine that took several twists and turns along…
hack and bug bounty
How to Create a Simple Fork Bomb Virus and the Impact It Has on Your System
Medium
How to Create a Simple Fork Bomb Virus and the Impact It Has on Your System
Welcome to my new article! In this write-up, I will show you how I created a fork bomb using a batch file and executed it within a Windows machine on my network to observe its impact on the system…
hack and bug bounty
TCM — Practical Ethical Hacking Course — Introduction to Python — 1
Medium
TCM — Practical Ethical Hacking Course — Introduction to Python — 1
Shebang
hack and bug bounty
Writing your own Nuclei templates
Medium
Writing your own Nuclei templates
In this (first) post, i am gonna show you how to write your own Nuclei templates. If you need to detect vulnerabilities using Nuclei you…
hack and bug bounty
Top 3 AppSec Container vulnerabilities
Medium
Top 3 AppSec Container vulnerabilities
3 of the top application security vulnerabilities in containerised workloads are image, registry and runtime risks.
hack and bug bounty
When Nothing Goes My Way
Medium
When Nothing Goes My Way
I let the gods decide my fate
hack and bug bounty
Extensions I Use For My Bug Bounty Hunting.
Medium
Extensions I Use For My Bug Bounty Hunting.
🧑🏻💻
Hi, Ajak Amico’s welcome back to another blog today. I will show you the Top 10 Extensions I use For my Bug Bounty journey that makes the…
hack and bug bounty
API Authentication Attack
Medium
API Authentication Attack
An authentication attack refers to a malicious attempt to gain unauthorized access to a system, application, or network by exploiting…
hack and bug bounty
Talking like a hacker: Ethical hacking terminology
Medium
Talking like a hacker: Ethical hacking terminology
Starting into ethical hacking can be difficult, and maybe you will read or hear many words for which you do not know the meaning or their…