hack and bug bounty
@hack_com
21
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
21 subscribers
hack and bug bounty
30 Tips how to use OSINT for bug hunting :
Medium
💻
30 Tips how to use OSINT for bug hunting
💻
:
1. Use Google Dorks to find vulnerabilities in web applications. 2. Use Shodan to find vulnerable IoT devices. 3. Use Whois to find information about domain names. 4. Use Maltego to visualize…
hack and bug bounty
Bagaimana saya mendapatkan $700 menggunakan FFUF+SHODAN
Medium
Bagaimana saya mendapatkan $700 menggunakan FFUF+SHODAN
Hai semuanya perkenalkan namaku Syarif Muhammad Sajjad seorang Bug Hunter pemula asal Sintang, Kalimantan Barat Indonesia. Pada kesempatan…
hack and bug bounty
SadQL
Medium
SadQL
Hi hackers My Name is Mosaa author sadql challenge
hack and bug bounty
Getting Started in Ethical Hacking/Penetration Testing
Medium
Getting Started in Ethical Hacking/Penetration Testing
Hey there, fellow hackers! This is my first-ever blog, and I’m super excited to dive into the intriguing world of penetration testing. In…
hack and bug bounty
Attacking Authentication in Web Pentesting Applications — 13 | 2023
Medium
Attacking Authentication in Web Pentesting Applications — 13 | 2023
Exploring the World of Web Application Security: Unraveling Authentication Vulnerabilities | karthikeyan Nagaraj
hack and bug bounty
HackTheBox “Mango” Walkthrough
Medium
HackTheBox “Mango” Walkthrough
Mango, a medium-level Linux OS machine on HackTheBox, centers around the exploitation of a NoSQL document database to circumvent an…
hack and bug bounty
Uncovering React Code with Source Maps
Medium
Uncovering React Code with Source Maps
React has gained immense popularity as a powerful JavaScript library, offering developers the tools to build dynamic and efficient user…
hack and bug bounty
Privilege Escalation with IAM Service on Amazon AWS Systems Through an Example
Medium
Privilege Escalation with IAM Service on Amazon AWS Systems Through an Example
Amazon Web Services (AWS) cloud platform has become the backbone of countless modern applications, providing scalable and reliable…
hack and bug bounty
Mastering Small Scope Programs: A Comprehensive Guide for Bug Hunting
Medium
Mastering Small Scope Programs: A Comprehensive Guide for Bug Hunting
Hi there, I hope you all are doing well. This is my 4th writeup here and today i will be discussing how to approach small scope programs…
hack and bug bounty
What is Pentesting?
Medium
What is Pentesting?
Penetration testing / pen testing or ethical hacking
hack and bug bounty
Fringe
Medium
Fringe
I listened to Joe Rogan and Marc Andreessen’s two-hour convo.
hack and bug bounty
ARMed for x86: How to run and compile x86 executables on Kali ARM
Medium
ARMed for x86: How to run and compile x86 executables on Kali ARM
I’m gonna keep it real with you here, the ARM-based Macbook was and is a game changer when it comes to laptops. The battery life is…
hack and bug bounty
HTB Legacy Walkthrough w/ Metasploit
Medium
HTB Legacy Walkthrough w/ Metasploit
nmap -A 10.129.173.183
hack and bug bounty
HackTheBox “Traverxec” Walkthrough
Medium
HackTheBox “Traverxec” Walkthrough
Traverxec, an easy-level Linux OS machine on HackTheBox, necessitating thorough enumeration and exploitation of the web server, Nostromo…
hack and bug bounty
$1000 for a simple Stored XSS
Medium
$1000 for a simple Stored XSS
I was hacking on a private program and I couldn't get anything interesting by fuzzing or using the website’s features.
hack and bug bounty
HTB Blue Walkthrough w/ Metasploit
Medium
HTB Blue Walkthrough w/ Metasploit
nmap -A 10.129.184.242
hack and bug bounty
LolBin with InstallUtil.exe: LolBin to Command Execution
Medium
LolBin with InstallUtil.exe: LolBin to Command Execution
It’s normal to see default binaries allowed into an AppLocker rule but you can’t execute any command into the machine so you can abuse…
hack and bug bounty
Leak of Sensitive Information: An Attacker Can Recover Every User’s Mobile Numbers
Medium
Leak of Sensitive Information: An Attacker Can Recover Every User’s Mobile Numbers
The data of all joined users can be retrieved by an attacker.
hack and bug bounty
Why Ethical Hackers?
Medium
Why Ethical Hackers?
“Cybercrime is the greatest threat to every company in the world.”
hack and bug bounty
Types of hackers
Medium
Types of hackers
🔻
𝗪𝗵𝗶𝘁𝗲 𝗵𝗮𝘁 𝗛𝗮𝗰𝗸𝗲𝗿
🔻