hack and bug bounty
@hack_com
21
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
21 subscribers
hack and bug bounty
The Art of SQL Injection: A Dive into Database Exploitation
Medium
The Art of SQL Injection: A Dive into Database Exploitation
In the vast realm of offensive security, SQL injection (often abbreviated as SQLi) stands out as one of the most notorious and prevalent…
hack and bug bounty
Cross-Site Scripting (XSS) : Unmasking the Web’s Silent Threat
Medium
Cross-Site Scripting (XSS) : Unmasking the Web’s Silent Threat
Introduction
hack and bug bounty
InfoSecSherpa’s News Roundup for Tuesday, August 8, 2023
Medium
InfoSecSherpa’s News Roundup for Tuesday, August 8, 2023
InfoSecSherpa: Your Guide Up a Mountain of Information!
hack and bug bounty
Acoustic Cyberattacks: When Sound Manipulates Systems
Medium
Acoustic Cyberattacks: When Sound Manipulates Systems
Introduction
hack and bug bounty
Ch3cklist3r
Medium
Ch3cklist3r
I have created an incomplete checklist (ch3cklist3r) that has been very helpful in my recent bug finding efforts. I gathered ideas and…
hack and bug bounty
Red Team Member — Let’s explain the Privilege Escalation with examples / Part 1
Medium
Red Team Member — Let’s explain the Privilege Escalation with examples / Part 1
Hello folks, I hope your week is going well. I’m getting hot and I got my drink again and I wanted to sit in front of the computer and…
hack and bug bounty
Mastering Web Application Pentesting with Burp Suite: A Comprehensive Guide — 0 | 2023
Medium
Mastering Web Application Pentesting with Burp Suite: A Comprehensive Guide — 0 | 2023
Unveiling the Basics of Burp Suite for Effective Web Application Penetration Testing
hack and bug bounty
Mastering .NET Framework 4.0 Security: Best Practices & Automation
Medium
Mastering .NET Framework 4.0 Security: Best Practices & Automation
“Mastering .NET Framework 4.0 Security: Best Practices & Automation” is published by SimeonOnSecurity.
hack and bug bounty
Enhancing Oracle JRE 8 Security: Best Practices, STIGs, and Configuration Examples
Medium
Enhancing Oracle JRE 8 Security: Best Practices, STIGs, and Configuration Examples
“Enhancing Oracle JRE 8 Security: Best Practices, STIGs, and Configuration Examples” is published by SimeonOnSecurity.
hack and bug bounty
Mozilla FireFox STIG and Hardening: Complete Guide for Configuring Safe Browsing
Medium
Mozilla FireFox STIG and Hardening: Complete Guide for Configuring Safe Browsing
“Mozilla FireFox STIG and Hardening: Complete Guide for Configuring Safe Browsing” is published by SimeonOnSecurity.
hack and bug bounty
WEMIX Bug Bounty Program Kicks Off
Medium
WEMIX Bug Bounty Program Kicks Off
To further enhance the security of the WEMIX ecosystem, CertiK, the key security partner of WEMIX, has launched the WEMIX Bug Bounty…
hack and bug bounty
CEWL vs. Common Password Lists: Which One Is More Effective for Password Cracking?
Medium
CEWL vs. Common Password Lists: Which One Is More Effective for Password Cracking?
CEWL stands for Custom Wordlist Generator, a tool used for creating custom wordlists or dictionaries that can be used for password…
hack and bug bounty
Burp Suite vs. Other Web Application Security Tools: A Comparative Analysis
Medium
Burp Suite vs. Other Web Application Security Tools: A Comparative Analysis
In today’s interconnected world, web application security has become more critical than ever before. As businesses rely heavily on web…
hack and bug bounty
From Self XSS to Account Take Over(ATO)
Medium
From Self XSS to Account Take Over(ATO)
Hello there ,
hack and bug bounty
How to Get Paid on Twitter (Now X)
Medium
How to Get Paid on Twitter (Now X)
Twitter Blue is a subscription service that offers enhanced features, and meeting certain criteria can enable users to earn money.
hack and bug bounty
Deep Dive into iOS Security: Protecting Your Privacy and Data
Medium
Deep Dive into iOS Security: Protecting Your Privacy and Data
Explore the robust iOS security features safeguarding your privacy & data. Learn about encryption, biometrics, and iOS penetration testing.
hack and bug bounty
Learning Security Testing from Scratch: A Comprehensive Guide
Medium
Learning Security Testing from Scratch: A Comprehensive Guide
Introduction
hack and bug bounty
What You Will Learn In Ethical Hacking Course In Singapore
Medium
What You Will Learn In Ethical Hacking Course In Singapore
In the modern era, cyber threats loom large, making the role of ethical hackers more critical than ever. If you’re based in Singapore or…
hack and bug bounty
Hacker’s Delight: Your Path to Becoming a Stealthy Cyber Hero Step by Step
Medium
Hacker’s Delight: Your Path to Becoming a Stealthy Cyber Hero Step by Step
hack and bug bounty
Bulls Kick-Off Session Strong as PEPE Dominates
Medium
Bulls Kick-Off Session Strong as PEPE Dominates
Markets have started with bullish sentiment, with the global market cap recording a 1.46% increase in a day to take the total cap to $1.18T…