hack and bug bounty
@hack_com
21
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
21 subscribers
hack and bug bounty
Staying One Step Ahead: Your Guide to Building an Effective Application Security Roadmap
Medium
Staying One Step Ahead: Your Guide to Building an Effective Application Security Roadmap
In the ever-evolving world of cyber threats, keeping applications safe and secure is a task that requires planning, teamwork, and most…
hack and bug bounty
I will do penetration and vulnerability test your website with professional report
Medium
I will do penetration and vulnerability test your website with professional report
Are you looking to secure your web application against the most common security vulnerabilities? As a certified ethical hacker, I…
hack and bug bounty
Best Approach to LFI
Medium
Best Approach to LFI
This blog would not have been possible without Sachin sir , founder of Armour Infosec
hack and bug bounty
30 Tips how to use OSINT for bug hunting :
Medium
💻
30 Tips how to use OSINT for bug hunting
💻
:
1. Use Google Dorks to find vulnerabilities in web applications. 2. Use Shodan to find vulnerable IoT devices. 3. Use Whois to find information about domain names. 4. Use Maltego to visualize…
hack and bug bounty
Bagaimana saya mendapatkan $700 menggunakan FFUF+SHODAN
Medium
Bagaimana saya mendapatkan $700 menggunakan FFUF+SHODAN
Hai semuanya perkenalkan namaku Syarif Muhammad Sajjad seorang Bug Hunter pemula asal Sintang, Kalimantan Barat Indonesia. Pada kesempatan…
hack and bug bounty
SadQL
Medium
SadQL
Hi hackers My Name is Mosaa author sadql challenge
hack and bug bounty
Getting Started in Ethical Hacking/Penetration Testing
Medium
Getting Started in Ethical Hacking/Penetration Testing
Hey there, fellow hackers! This is my first-ever blog, and I’m super excited to dive into the intriguing world of penetration testing. In…
hack and bug bounty
Attacking Authentication in Web Pentesting Applications — 13 | 2023
Medium
Attacking Authentication in Web Pentesting Applications — 13 | 2023
Exploring the World of Web Application Security: Unraveling Authentication Vulnerabilities | karthikeyan Nagaraj
hack and bug bounty
HackTheBox “Mango” Walkthrough
Medium
HackTheBox “Mango” Walkthrough
Mango, a medium-level Linux OS machine on HackTheBox, centers around the exploitation of a NoSQL document database to circumvent an…
hack and bug bounty
Uncovering React Code with Source Maps
Medium
Uncovering React Code with Source Maps
React has gained immense popularity as a powerful JavaScript library, offering developers the tools to build dynamic and efficient user…
hack and bug bounty
Privilege Escalation with IAM Service on Amazon AWS Systems Through an Example
Medium
Privilege Escalation with IAM Service on Amazon AWS Systems Through an Example
Amazon Web Services (AWS) cloud platform has become the backbone of countless modern applications, providing scalable and reliable…
hack and bug bounty
Mastering Small Scope Programs: A Comprehensive Guide for Bug Hunting
Medium
Mastering Small Scope Programs: A Comprehensive Guide for Bug Hunting
Hi there, I hope you all are doing well. This is my 4th writeup here and today i will be discussing how to approach small scope programs…
hack and bug bounty
What is Pentesting?
Medium
What is Pentesting?
Penetration testing / pen testing or ethical hacking
hack and bug bounty
Fringe
Medium
Fringe
I listened to Joe Rogan and Marc Andreessen’s two-hour convo.
hack and bug bounty
ARMed for x86: How to run and compile x86 executables on Kali ARM
Medium
ARMed for x86: How to run and compile x86 executables on Kali ARM
I’m gonna keep it real with you here, the ARM-based Macbook was and is a game changer when it comes to laptops. The battery life is…
hack and bug bounty
HTB Legacy Walkthrough w/ Metasploit
Medium
HTB Legacy Walkthrough w/ Metasploit
nmap -A 10.129.173.183
hack and bug bounty
HackTheBox “Traverxec” Walkthrough
Medium
HackTheBox “Traverxec” Walkthrough
Traverxec, an easy-level Linux OS machine on HackTheBox, necessitating thorough enumeration and exploitation of the web server, Nostromo…
hack and bug bounty
$1000 for a simple Stored XSS
Medium
$1000 for a simple Stored XSS
I was hacking on a private program and I couldn't get anything interesting by fuzzing or using the website’s features.
hack and bug bounty
HTB Blue Walkthrough w/ Metasploit
Medium
HTB Blue Walkthrough w/ Metasploit
nmap -A 10.129.184.242
hack and bug bounty
LolBin with InstallUtil.exe: LolBin to Command Execution
Medium
LolBin with InstallUtil.exe: LolBin to Command Execution
It’s normal to see default binaries allowed into an AppLocker rule but you can’t execute any command into the machine so you can abuse…