hack and bug bounty
@hack_com
21
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
21 subscribers
hack and bug bounty
QUICK GUIDE — Malware Analysis and Ethical Hacking Links to Tools, Training, and Certifications
Medium
QUICK GUIDE — Malware Analysis and Ethical Hacking Links to Tools, Training, and Certifications
Malware Analysis and Ethical Hacking | Tools, Resources, and Training
hack and bug bounty
HTB — SolidState | 43/100
Medium
HTB — SolidState | 43/100
Howdy! Today I’m working on SolidState from HackTheBox. This was a really fun box that involved guessing weak credentials for a James…
hack and bug bounty
In the Making
Medium
In the Making
Twitter’s era has ended, welcome to the age of X.
hack and bug bounty
Cracking the Code: The Unseen Secrets of the App Sec Vulnerability Management Lifecycle!
Medium
Cracking the Code: The Unseen Secrets of the App Sec Vulnerability Management Lifecycle!
Application Security Vulnerabilities can be introduced in many ways into your application. How do you know where they are , and how can…
hack and bug bounty
Attacking Misconfigure Spring Boot Actuators
Medium
Attacking Misconfigure Spring Boot Actuators
In this story I’ll write about spring boot actuators. I’ll explain the components and we will see Hackerone reports about it. It’s very…
hack and bug bounty
HackTheBox Writeup — Delivery
Medium
HackTheBox Writeup — Delivery
Step1 : Enumeration
hack and bug bounty
PII-nacles of Discovery: Deep Recon, Fourth-Level Subdomains, and Abusing Exposed .git Repositories
Medium
PII-nacles of Discovery: Deep Recon, Fourth-Level Subdomains, and Abusing Exposed .git Repositories
“All your Git repos are belong to us.”
hack and bug bounty
Username Aliasing and Draft Synchronization On X(fka Twitter)
Medium
Username Aliasing and Draft Synchronization On X(fka Twitter)
New feature requests; synchronization feature on draft (desktop <->phones) and username redirection within posts (old — new user…
hack and bug bounty
Burp Suite in Action: Real-Life Examples of Web Application Security Testing
Medium
Burp Suite in Action: Real-Life Examples of Web Application Security Testing
Web application security is of utmost importance in today’s digital landscape. As businesses rely heavily on web applications to deliver…
hack and bug bounty
THM — Pickle Rick | 44/100
Medium
THM — Pickle Rick | 44/100
Hi! Here is CTF writeup 44 out of a planned 100, Pickle Rick from TryHackMe. This was a really fun and very beginner friendly box. This…
hack and bug bounty
HackTheBox “OpenAdmin” Walkthrough
Medium
HackTheBox “OpenAdmin” Walkthrough
OpenAdmin, an easy-level Linux OS machine on HackTheBox, involves conducting some enumeration to uncover an instance of OpenNetAdmin…
hack and bug bounty
Completing My First SQL Injection Vulnerbility Allowing Retrievel Of Hidden Data
Medium
Application Security: SQL Injection Vulnerability Allowing Retrieval Of Hidden Data
Embarking on my journey of practical, hands-on learning has always been my preferred approach to gaining new knowledge. Today marked an…
hack and bug bounty
InfoSecSherpa’s News Roundup for Monday, August 7, 2023
Medium
InfoSecSherpa’s News Roundup for Monday, August 7, 2023
InfoSecSherpa: Your Guide Up a Mountain of Information!
hack and bug bounty
Portswigger Web Security Academy: Directory Traversal
Medium
Portswigger Web Security Academy: Directory Traversal
I have been working through the Portswigger Web Security Academy to improve my knowledge of web app vulnerabilities and recently finished…
hack and bug bounty
8 طرق لإصلاح لا يمكن استرداد التغريدات في الوقت الحالي
Medium
8 طرق لإصلاح لا يمكن استرداد التغريدات في الوقت الحالي
X (المعروف سابقًا باسم Twitter) يحظى بشعبية كبيرة بين أولئك الذين يريدون الوصول الفوري إلى الأخبار ونشر أفكارهم. نظرًا لأنه نظام أساسي على الإنترنت ، فقد تواجه مشكلات ، خاصة عند تحميل تغريدات جديدة…
hack and bug bounty
How I found and reported an XSLT injection vulnerability
Medium
How I found and reported an XSLT injection vulnerability
Introduction
hack and bug bounty
The Future of Bug Bounty Hunting: Predictions and Trends
Medium
The Future of Bug Bounty Hunting: Predictions and Trends
Introduction
hack and bug bounty
Exploring CVE-2023–1389: RCE in TP-Link Archer AX21
Medium
Exploring CVE-2023–1389: RCE in TP-Link Archer AX21
Development
hack and bug bounty
Navigating Internet Hoaxes: Understanding, Psychology, and Safeguarding Online Integrity
Medium
Navigating Internet Hoaxes: Understanding, Psychology, and Safeguarding Online Integrity
“Navigating Internet Hoaxes: Understanding, Psychology, and Safeguarding Online Integrity” is published by SimeonOnSecurity.
hack and bug bounty
Mitigating Insider Threats: Strategies for Proactive Security and Prevention
Medium
Mitigating Insider Threats: Strategies for Proactive Security and Prevention
“Mitigating Insider Threats: Strategies for Proactive Security and Prevention” is published by SimeonOnSecurity.