hack and bug bounty
@hack_com
21
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
21 subscribers
hack and bug bounty
Mastering Cybersecurity: Exploring the Vital Risk Management Framework
Medium
Mastering Cybersecurity: Exploring the Vital Risk Management Framework
“Mastering Cybersecurity: Exploring the Vital Risk Management Framework” is published by SimeonOnSecurity.
hack and bug bounty
FISMA: Enhancing Federal Cybersecurity for Safer Data
Medium
FISMA: Enhancing Federal Cybersecurity for Safer Data
“FISMA: Enhancing Federal Cybersecurity for Safer Data” is published by SimeonOnSecurity.
hack and bug bounty
Bypassing uncomfortably easy CAPTCHAs using python PIL in my free time
Medium
Bypassing uncomfortably easy CAPTCHAs in my free time
One day at night, I was going through my recon data for multiple bug bounty targets but not really having the energy to do the usual…
hack and bug bounty
Rewriting IP for filter bypass
Medium
Rewriting IP for filter bypass
Ipv4 addresses are built as 4 blocks of integers which can range from 0 to 255. If we want to ping localhost we are used to write 127.0.0.1…
hack and bug bounty
ShieldQL — a GraphQL security solution
Medium
ShieldQL — a GraphQL security solution
The Problem with GraphQL
hack and bug bounty
A High-Impact Payment Bypass on Government Website - A Tale of Business Logic Flaw Exploitation
Medium
A High-Impact Payment Bypass on Government Website - A Tale of Business Logic Flaw Exploitation
I explored a government website and found a critical flaw that could lead to unauthorized transactions.
🕵️♂️
💸
hack and bug bounty
CVE-2021–3493 — OverlayFS — Privilege Escalation
Medium
CVE-2021–3493 — OverlayFS — Privilege Escalation
Introduction
hack and bug bounty
IPVanish Review 2023 — One of the Best VPNs of the industry
Medium
IPVanish Review 2023 — One of the Best VPNs of the industry
>>> Click here to visit Officla website for the Best Offer <<<
hack and bug bounty
HTB — Netmon | 46/100
Medium
HTB — Netmon | 46/100
Hi! Today I’m working on Netmon from HackTheBox. This Easy rated machine featured discovering old credentials in an FTP server with…
hack and bug bounty
The Ultimate Guide to the Top 15+ Ethical Hacking Certifications for a Thriving 2023 Career
Medium
The Ultimate Guide to the Top 15+ Ethical Hacking Certifications for a Thriving 2023 Career
Finding weaknesses in a computer system or network and taking action to close them is known as ethical hacking.
hack and bug bounty
Uncovering Hidden Likes through Parameter Manipulation
Medium
Uncovering Hidden Likes through Parameter Manipulation
Hello everyone, welcome back to yet another blog. Thank you so much for showing your love in my previous post. Without any further delay…
hack and bug bounty
“Securing My Path: A Year of B.Tech and Cybersecurity Triumphs"
Medium
“Securing My Path: A Year of B.Tech and Cybersecurity Triumphs"
Hey, I’m Abhishek Dirisipo.
hack and bug bounty
Introducing Goctopus: Open-Source GraphQL endpoint discovery tool written in go
Medium
Introducing Goctopus: Open-Source GraphQL endpoint discovery tool written in go
In the fast-evolving domain of APIs, GraphQL has emerged as a powerful, data-oriented language. As its adoption soars, so does the need for…
hack and bug bounty
Securing the University by failure of invalidating of session
Medium
Securing the University by failure of invalidating of session
Tale of securing the university of united states.
hack and bug bounty
Bug Bounty Course For Begineers
Medium
Bug Bounty Course For Begineers
Are you ready to step into the exciting world of ethical hacking and web security? Look no further! Join our globally renowned…
hack and bug bounty
Site Takeover via SCCM’s AdminService API
Medium
Site Takeover via SCCM’s AdminService API
tl:dr: The SCCM AdminService API is vulnerable to NTLM relaying and can be abused for SCCM site takeover.
hack and bug bounty
Join GuidedHacking Today
Medium
Join GuidedHacking Today
Learning Penetration Testing
hack and bug bounty
Exploring Burp Suite’s Features: A Detailed Overview
Medium
Exploring Burp Suite’s Features: A Detailed Overview
In the field of web application security testing, Burp Suite has established itself as a powerful and widely-used tool. Whether you are a…
hack and bug bounty
CSRF in OAuth flow of a private program.
Medium
CSRF in OAuth flow of a private program.
Hello friend, This writeup is about a simple CSRF in a function that’s using OAuth to attach third-party accounts to the user’s dashboard.
hack and bug bounty
Account takeover of any user through password reset functionality.
Medium
Account takeover of any user through password reset functionality.
Hello Everyone,