hack and bug bounty
@hack_com
21
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
21 subscribers
hack and bug bounty
The Best Homelab Hardware: Building a Powerful and Budget-Friendly Setup
Medium
The Best Homelab Hardware: Building a Powerful and Budget-Friendly Setup
Sufficient RAM is crucial for smooth operations in your homelab. It allows you to run multiple applications simultaneously and ensures optimal performance. Here are some recommendations for RAM…
hack and bug bounty
How to Start a Career in Cybersecurity: Coding Skills and Beyond
Medium
How to Start a Career in Cybersecurity: Coding Skills and Beyond
Conversely, for those drawn to technical challenges involving coding and programming, a multitude of opportunities beckon. These roles demand a profound grasp of programming languages and the acumen…
hack and bug bounty
Mastering Advanced Windows CMD Scripting for Enhanced Efficiency
Medium
Mastering Advanced Windows CMD Scripting for Enhanced Efficiency
“Mastering Advanced Windows CMD Scripting for Enhanced Efficiency” is published by SimeonOnSecurity.
hack and bug bounty
Securing Vulnerable Groups: Cyber Threats and Protection Strategies
Medium
Securing Vulnerable Groups: Cyber Threats and Protection Strategies
The data accessed by foreign powers can be used for insidious surveillance operations. They may monitor the actions and interactions of vulnerable individuals, creating an atmosphere of constant…
hack and bug bounty
Empowering Privacy: Understanding the CCPA and Your Rights
Medium
Empowering Privacy: Understanding the CCPA and Your Rights
“Empowering Privacy: Understanding the CCPA and Your Rights” is published by SimeonOnSecurity.
hack and bug bounty
Defending Data: PCI-DSS Explained for Secure Card Transactions
Medium
Defending Data: PCI-DSS Explained for Secure Card Transactions
“Defending Data: PCI-DSS Explained for Secure Card Transactions” is published by SimeonOnSecurity.
hack and bug bounty
Demystifying GDPR: Your Guide to Data Privacy Regulations
Medium
Demystifying GDPR: Your Guide to Data Privacy Regulations
“Demystifying GDPR: Your Guide to Data Privacy Regulations” is published by SimeonOnSecurity.
hack and bug bounty
Mastering Cybersecurity: Exploring the Vital Risk Management Framework
Medium
Mastering Cybersecurity: Exploring the Vital Risk Management Framework
“Mastering Cybersecurity: Exploring the Vital Risk Management Framework” is published by SimeonOnSecurity.
hack and bug bounty
FISMA: Enhancing Federal Cybersecurity for Safer Data
Medium
FISMA: Enhancing Federal Cybersecurity for Safer Data
“FISMA: Enhancing Federal Cybersecurity for Safer Data” is published by SimeonOnSecurity.
hack and bug bounty
Bypassing uncomfortably easy CAPTCHAs using python PIL in my free time
Medium
Bypassing uncomfortably easy CAPTCHAs in my free time
One day at night, I was going through my recon data for multiple bug bounty targets but not really having the energy to do the usual…
hack and bug bounty
Rewriting IP for filter bypass
Medium
Rewriting IP for filter bypass
Ipv4 addresses are built as 4 blocks of integers which can range from 0 to 255. If we want to ping localhost we are used to write 127.0.0.1…
hack and bug bounty
ShieldQL — a GraphQL security solution
Medium
ShieldQL — a GraphQL security solution
The Problem with GraphQL
hack and bug bounty
A High-Impact Payment Bypass on Government Website - A Tale of Business Logic Flaw Exploitation
Medium
A High-Impact Payment Bypass on Government Website - A Tale of Business Logic Flaw Exploitation
I explored a government website and found a critical flaw that could lead to unauthorized transactions.
🕵️♂️
💸
hack and bug bounty
CVE-2021–3493 — OverlayFS — Privilege Escalation
Medium
CVE-2021–3493 — OverlayFS — Privilege Escalation
Introduction
hack and bug bounty
IPVanish Review 2023 — One of the Best VPNs of the industry
Medium
IPVanish Review 2023 — One of the Best VPNs of the industry
>>> Click here to visit Officla website for the Best Offer <<<
hack and bug bounty
HTB — Netmon | 46/100
Medium
HTB — Netmon | 46/100
Hi! Today I’m working on Netmon from HackTheBox. This Easy rated machine featured discovering old credentials in an FTP server with…
hack and bug bounty
The Ultimate Guide to the Top 15+ Ethical Hacking Certifications for a Thriving 2023 Career
Medium
The Ultimate Guide to the Top 15+ Ethical Hacking Certifications for a Thriving 2023 Career
Finding weaknesses in a computer system or network and taking action to close them is known as ethical hacking.
hack and bug bounty
Uncovering Hidden Likes through Parameter Manipulation
Medium
Uncovering Hidden Likes through Parameter Manipulation
Hello everyone, welcome back to yet another blog. Thank you so much for showing your love in my previous post. Without any further delay…
hack and bug bounty
“Securing My Path: A Year of B.Tech and Cybersecurity Triumphs"
Medium
“Securing My Path: A Year of B.Tech and Cybersecurity Triumphs"
Hey, I’m Abhishek Dirisipo.
hack and bug bounty
Introducing Goctopus: Open-Source GraphQL endpoint discovery tool written in go
Medium
Introducing Goctopus: Open-Source GraphQL endpoint discovery tool written in go
In the fast-evolving domain of APIs, GraphQL has emerged as a powerful, data-oriented language. As its adoption soars, so does the need for…