hack and bug bounty
@hack_com
21
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
21 subscribers
hack and bug bounty
Web Application Exploits: Information Leakage and Improper Error Handling
Medium
Web Application Exploits: Information Leakage and Improper Error Handling
Introduction
hack and bug bounty
Crypto Price Analysis: BTC Holds Ground as X, OP, and Other Coins Are Up
Medium
Crypto Price Analysis: BTC Holds Ground as X, OP, and Other Coins Are Up
In this daily crypto price analysis, we will delve into the recent performance of some of the most prominent coins in the market. Today’s…
hack and bug bounty
HTB — Timelapse | 39/100
Medium
HTB — Timelapse | 39/100
Hi! Back at it with another CTF writeup, this time featuring Timelapse from HackTheBox. This was an Easy rated Active Directory box that…
hack and bug bounty
SBOM output automation
Medium
SBOM output automation
SBOM tools can automatically generate SBOMs in various formats as part of a continuous integration/continuous deployment (CI/CD) pipeline…
hack and bug bounty
How i hacked around 300 with Details
Medium
How i hacked around 300 with Details
lot of criticizing a people so I decided to make a complete tutorial about it the how our i was able to hack more than 300 website and use…
hack and bug bounty
The Evolution of DoD Cybersecurity Workforce Qualification: From DoD 8570 to DoD 8140.03
Medium
The Evolution of DoD Cybersecurity Workforce Qualification: From DoD 8570 to DoD 8140.03
As a defense contractor, you're likely familiar with the Department of Defense's (DoD) guidelines for the training, certification, and management of its cybersecurity workforce. Over the years, these…
hack and bug bounty
EternalBlue Explained: An In-Depth Analysis of the Notorious Windows Flaw
Medium
EternalBlue Explained: An In-Depth Analysis of the Notorious Windows Flaw
EternalBlue is one of the most infamous cybersecurity vulnerabilities known today. This article will explore the details of this flaw, its…
hack and bug bounty
Unsafe and Insecure C# Functions: Secure Coding Practices and Alternatives for Stronger Software
Medium
Unsafe and Insecure C# Functions: Secure Coding Practices and Alternatives for Stronger Software
“Unsafe and Insecure C# Functions: Secure Coding Practices and Alternatives for Stronger Software” is published by SimeonOnSecurity.
hack and bug bounty
Secure Python Coding: Avoiding Unsafe Functions for Robust Applications
Medium
Secure Python Coding: Avoiding Unsafe Functions for Robust Applications
“Secure Python Coding: Avoiding Unsafe Functions for Robust Applications” is published by SimeonOnSecurity.
hack and bug bounty
Mastering Decentralization: How to Set Up a Presearch Node
Medium
Mastering Decentralization: How to Set Up a Presearch Node
“Mastering Decentralization: How to Set Up a Presearch Node” is published by SimeonOnSecurity.
hack and bug bounty
Building Scalable and Secure User Management with AWS Cognito and Node.js
Medium
Building Scalable and Secure User Management with AWS Cognito and Node.js
Introduction:
hack and bug bounty
5 Easy-To-Use Reconnaissance Tools
Medium
5 Easy-To-Use Reconnaissance Tools
Reconnaissance (or simply Recon) is initial phase in Pen Testing process. The goal of recon is to gather as much information about the…
hack and bug bounty
How to crack a network with WEF
Medium
How to crack a network with WEF
In our today’s guide, we will show you how to crack a wifi password with the WEF program.
hack and bug bounty
Bluetooth Hacking: The Most Vulnerable Data Transmission Protocol!
Medium
Bluetooth Hacking: The Most Vulnerable Data Transmission Protocol!
Today, Bluetooth is embedded in almost all our devices and gadgets. These include our computers, smartphones, iPods, tablets, speakers…
hack and bug bounty
Stegomalware Surge: malware in files, videos and images
Medium
Stegomalware Surge: malware in files, videos and images
A rapid increase in the number of Stegomalware cases using its technique was recently reported sealing as realized by the cybersecurity…
hack and bug bounty
Sending fake SMS message and wiretapping process
Medium
Sending fake SMS message and wiretapping process
SMS, or commonly referred to as text messaging, is a protocol originally developed in the 1980s and first implemented in the European GSM…
hack and bug bounty
Interception of data from Telecommunications Base Stations
Medium
Interception of data from Telecommunications Base Stations
In today’s guide we will show you how to monitor the messages and also the calls of everyone who is on the same telecommunications base…
hack and bug bounty
Hacking and hardware. Safety myths
Medium
Hacking and hardware. Safety myths
There are many myths surrounding safety, which claim that hardware is never responsible for anything bad that can happen. They are all untenable and we will try to take them down one by one. Many…
hack and bug bounty
Access devices remotely with just one click from the victim!
Medium
Access devices remotely with just one click from the victim!
In recent days there has been no end to the revelations about the surveillance of mobile phones in our country with the sophisticated Predator malware. According to information we have gathered, the…
hack and bug bounty
Exploitation guide for Follina
Medium
Exploitation guide for Follina
Some European governments have been the target of a phishing campaign that uses malicious rich text documents (RTF from Rich Text Format)…