hack and bug bounty
@hack_com
21
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
21 subscribers
hack and bug bounty
Cybersecurity incidents like this can be concerning.
Medium
Cybersecurity incidents like this can be concerning.
Citrix vpn vulnerability
hack and bug bounty
THM — Corridor | 38/100
Medium
THM — Corridor | 38/100
Hi! Today I’m working on the Easy rated box Corridor from TryHackMe. This was a very simple and quick box highlighting IDOR…
hack and bug bounty
from shodan to interesting django misconfiguration
Medium
from shodan to interesting django misconfiguration
hi guys i hope you catching some bugs and earning some cash
hack and bug bounty
Ransomware Rampage: A Digital Heist Odyssey
Medium
Ransomware Rampage: A Digital Heist Odyssey
hack and bug bounty
Hacker Within: Master the Art of Penetration Testing and Earn Big Bucks!
Medium
Hacker Within: Master the Art of Penetration Testing and Earn Big Bucks!
Discover the Thrilling World of Ethical Hacking — Turn Your Skills into Lucrative Opportunities!
hack and bug bounty
Web Application Exploits: Information Leakage and Improper Error Handling
Medium
Web Application Exploits: Information Leakage and Improper Error Handling
Introduction
hack and bug bounty
Crypto Price Analysis: BTC Holds Ground as X, OP, and Other Coins Are Up
Medium
Crypto Price Analysis: BTC Holds Ground as X, OP, and Other Coins Are Up
In this daily crypto price analysis, we will delve into the recent performance of some of the most prominent coins in the market. Today’s…
hack and bug bounty
HTB — Timelapse | 39/100
Medium
HTB — Timelapse | 39/100
Hi! Back at it with another CTF writeup, this time featuring Timelapse from HackTheBox. This was an Easy rated Active Directory box that…
hack and bug bounty
SBOM output automation
Medium
SBOM output automation
SBOM tools can automatically generate SBOMs in various formats as part of a continuous integration/continuous deployment (CI/CD) pipeline…
hack and bug bounty
How i hacked around 300 with Details
Medium
How i hacked around 300 with Details
lot of criticizing a people so I decided to make a complete tutorial about it the how our i was able to hack more than 300 website and use…
hack and bug bounty
The Evolution of DoD Cybersecurity Workforce Qualification: From DoD 8570 to DoD 8140.03
Medium
The Evolution of DoD Cybersecurity Workforce Qualification: From DoD 8570 to DoD 8140.03
As a defense contractor, you're likely familiar with the Department of Defense's (DoD) guidelines for the training, certification, and management of its cybersecurity workforce. Over the years, these…
hack and bug bounty
EternalBlue Explained: An In-Depth Analysis of the Notorious Windows Flaw
Medium
EternalBlue Explained: An In-Depth Analysis of the Notorious Windows Flaw
EternalBlue is one of the most infamous cybersecurity vulnerabilities known today. This article will explore the details of this flaw, its…
hack and bug bounty
Unsafe and Insecure C# Functions: Secure Coding Practices and Alternatives for Stronger Software
Medium
Unsafe and Insecure C# Functions: Secure Coding Practices and Alternatives for Stronger Software
“Unsafe and Insecure C# Functions: Secure Coding Practices and Alternatives for Stronger Software” is published by SimeonOnSecurity.
hack and bug bounty
Secure Python Coding: Avoiding Unsafe Functions for Robust Applications
Medium
Secure Python Coding: Avoiding Unsafe Functions for Robust Applications
“Secure Python Coding: Avoiding Unsafe Functions for Robust Applications” is published by SimeonOnSecurity.
hack and bug bounty
Mastering Decentralization: How to Set Up a Presearch Node
Medium
Mastering Decentralization: How to Set Up a Presearch Node
“Mastering Decentralization: How to Set Up a Presearch Node” is published by SimeonOnSecurity.
hack and bug bounty
Building Scalable and Secure User Management with AWS Cognito and Node.js
Medium
Building Scalable and Secure User Management with AWS Cognito and Node.js
Introduction:
hack and bug bounty
5 Easy-To-Use Reconnaissance Tools
Medium
5 Easy-To-Use Reconnaissance Tools
Reconnaissance (or simply Recon) is initial phase in Pen Testing process. The goal of recon is to gather as much information about the…
hack and bug bounty
How to crack a network with WEF
Medium
How to crack a network with WEF
In our today’s guide, we will show you how to crack a wifi password with the WEF program.
hack and bug bounty
Bluetooth Hacking: The Most Vulnerable Data Transmission Protocol!
Medium
Bluetooth Hacking: The Most Vulnerable Data Transmission Protocol!
Today, Bluetooth is embedded in almost all our devices and gadgets. These include our computers, smartphones, iPods, tablets, speakers…
hack and bug bounty
Stegomalware Surge: malware in files, videos and images
Medium
Stegomalware Surge: malware in files, videos and images
A rapid increase in the number of Stegomalware cases using its technique was recently reported sealing as realized by the cybersecurity…