hack and bug bounty
@hack_com
21
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
21 subscribers
hack and bug bounty
Malicious Excel analysis using .NET library
Medium
Malicious Excel analysis using .NET library
Epic Manchego has been active since June 2020, targeting companies around the world with phishing emails that contain malicious Excel…
hack and bug bounty
Finding of Host Header Vulnerability in Website
Medium
Finding of Host Header Vulnerability in Website
Hey everyone, This Side Sidharth Today topic about host header vulnerability. Firstly, I am explaining background concept about host header…
hack and bug bounty
What can be done to protect against SQL Injection?
Medium
What can be done to protect against SQL Injection?
ORM Usage: By using ORM (Object-Relational Mapping) libraries, you can run SQL queries with object-based queries instead of direct code…
hack and bug bounty
An AI Primer for Application & Cloud Security
Medium
An AI Primer for Application & Cloud Security
An introduction to how Artificial Intelligence (AI) can help Application & Cloud Security teams now and in the future.
hack and bug bounty
Firewall: What it is and why you should use it
Medium
Firewall: What it is and why you should use it
Have you heard of Firewall or Greek for Firewall? What is it really used for? Does it stop viruses? Do you need to have? Here are five key…
hack and bug bounty
cybersMake your own Penetration Testing Box with a Raspberry Pi
Medium
cybersMake your own Penetration Testing Box with a Raspberry Pi
In our infosec guide today, we will see how easy it is to create our own Penetration Testing Box with a Raspberry Pi, using an open source…
hack and bug bounty
ATM Hacking: Advanced methods for finding security vulnerabilities
Medium
ATM Hacking: Advanced methods for finding security vulnerabilities
The ATM is a machine that allows customers to make banking transactions without entering the bank.
hack and bug bounty
cyGenerate malicious QR codes to hack phones and scanners
Medium
cyGenerate malicious QR codes to hack phones and scanners
QR codes are everywhere, from product packaging to airline boarding passes, making scanners that read them a delicious target for hackers.
hack and bug bounty
Car Hacking: The ultimate guide! — Part II
Medium
Car Hacking: The ultimate guide! — Part II
This is the second part of the series “Car Hacking: The Ultimate Guide!”. In Part I, we discussed what a CAN Bus is, some information to…
hack and bug bounty
Myths and truths about VPNs
Medium
Myths and truths about VPNs
If you have ever seen an ad for a VPN on the internet, you may think that they are the perfect tools for your privacy. The reality is very…
hack and bug bounty
How to secure your online accounts
Medium
How to secure your online accounts
Most websites and online services require you to create an account to have full access to them. By now, many of your online accounts are scattered around the internet. These accounts contain your…
hack and bug bounty
How gamers can protect themselves from hackers
Medium
How gamers can protect themselves from hackers
With the steady growth of the online gaming industry, players are constantly being targeted by hackers and cyber criminals with various…
hack and bug bounty
Car Hacking: The ultimate guide! — Part I
Medium
Car Hacking: The ultimate guide! — Part I
Car safety is really exciting and is an interesting topic of study for many safety researchers. With the arrival of Self Driving cars like…
hack and bug bounty
Kioptrix Level 1 from Vulnhub Walkthrough (for absolute beginners)
Medium
Kioptrix Level 1 from Vulnhub Walkthrough (for absolute beginners)
Kioptrix Level 1 from Vulnhub Walkthrough (for absolute beginners)
I am doing the TCM security’s Practical Certified Ethical Hacking…
hack and bug bounty
What’s in it?
Medium
What’s in it?
Swisstronik Testnet 1.0 enhances the way developers build and deploy encrypted, privacy-preserving smart contracts. With a focus on…
hack and bug bounty
Cybersecurity & Information Security — What’s the difference?
Medium
Cybersecurity & Information Security — What’s the difference?
Data vs information
hack and bug bounty
Twitter Rebrands to X Twitter — Elon Musk’s Bold Move for the Future
Medium
Twitter Rebrands to X Twitter — Elon Musk’s Bold Move for the Future
In a surprising move, Twitter has embarked on a rebranding journey, transforming itself into Elon Musk’s favorite letter, X. Welcome to…
hack and bug bounty
Bypass Admin Panel Without Hacking Tool
Medium
Bypass Admin Panel Without Hacking Tool
How does the story go?
hack and bug bounty
Handling Client-Side Data Securely in Web Pentesting Applications — 11 | 2023
Medium
Handling Client-Side Data Securely in Web Pentesting Applications — 11 | 2023
Safeguarding Data Transmitted via the Client, Validating Client-Generated Data, and Implementing Robust Logging and Alerting Mechanisms |…
hack and bug bounty
Cyber Briefing: 2023.08.03
Medium
Cyber Briefing: 2023.08.03
👉
What’s going on in the cyber world today? AWS, Trojans, Salesforce, AI, Meow Attack, Mitel, Burger King, LockBit Ransomware, Italian…