hack and bug bounty
@hack_com
21
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
21 subscribers
hack and bug bounty
Proving Grounds: Hutch PenTest Report
Medium
Proving Grounds: Hutch PenTest Report
An Active Directory penetration test on Hutch from Proving Grounds
hack and bug bounty
Hacking WiFi: One Of The Fundamental Skills Of The Master Hacker in the 21st Century
Medium
Hacking WiFi: One Of The Fundamental Skills Of The Master Hacker in the 21st Century
Are you still struggling with finding the best, simplest, and easiest way to hack wifi? So was I a year ago when I set a goal to transition…
hack and bug bounty
Hackers’ Limbo: When the Bug Bounty Trail Goes Cold
Medium
Hackers’ Limbo: When the Bug Bounty Trail Goes Cold
Navigating the Abyss of Hacking
hack and bug bounty
Navigating Phishing Trends: Protecting Against Evolving Cyber Threats
Medium
Navigating Phishing Trends: Protecting Against Evolving Cyber Threats
The magnitude of the phishing threat is staggering. In 2022 alone, there were over 4.7 million phishing attacks, marking a substantial increase from previous years. This surge indicates that…
hack and bug bounty
How I Discovered Content Spoofing in PayPal in Just 15 Minutes.
Medium
How I Discovered Content Spoofing in PayPal in Just 15 Minutes.
While I was reading a write-up about a bug hunter who explained how he found CSRF in PayPal, it ended up inspiring me to search for…
hack and bug bounty
GoPhish On-Demand Ethical Phishing Campaigns Using Kasm Workspaces
Medium
GoPhish On-Demand Ethical Phishing Campaigns Using Kasm Workspaces
A recap of the GoPhish phishing framework launched from on-demand ephemeral Kasm Workspaces demonstrated on the Tech Raj YouTube channel.
hack and bug bounty
HACKING!!!
Medium
HACKING!!!
ఈ కాలం లో ఎక్కడ చుసిన ఒకటే మాట… మా ఫోన్ హాక్ అయింది,.. మా సోషల్ మీడియా అకౌంట్ హాక్ అయింది, మా బ్యాంకు అకౌంట్ హాక్ అయింది అని ఒకటే ఆందోళన .
hack and bug bounty
Mine Verus on Android: Easy Guide to Smartphone Mining
Medium
Mine Verus on Android: Easy Guide to Smartphone Mining
When mining Verus we typically like packs of high quality USB A to USB C charging cables. Here are a few suggestions In conclusion, the realm of cryptocurrency mining has expanded to embrace the…
hack and bug bounty
China’s Tech Giants Spend $5 Billion Buying Crippled Nvidia GPUs : TechNewsTalks
Medium
China’s Tech Giants Spend $5 Billion Buying Crippled Nvidia GPUs : TechNewsTalks
Despite the company’s recent success, its stock price has been subjected to high growth assumptions, including the expected doubling of sales in the coming quarters and an almost fourfold increase in…
hack and bug bounty
Introduction to Software Security
Medium
Introduction to Software Security
Overview of this blog?
hack and bug bounty
Quackerjack write-up — Proving Grounds, Get To Work
Medium
Quackerjack write-up — Proving Grounds, Get To Work
Write up for Quackerjack, an intermediate level machine from Proving Grounds (PG) by OffSec.
hack and bug bounty
How I Discovered Over 40+ Impactful Vulnerabilities Within 1 Hour, Just for Fun!
Medium
How I Discovered Over 40+ Impactful Vulnerabilities Within 1 Hour, Just for Fun!
Hello, I’m Takshal, aka tojojo. I hope you all are doing well. Today, I’m excited to share my journey of finding more than 40+ impactful…
hack and bug bounty
Improper Neutralization of Input During Web Page Generation, Stored XSS in KiwiTCMS…
Medium
Improper Neutralization of Input During Web Page Generation, Stored XSS in KiwiTCMS…
Hi everyone
👋🏻
, Today I would like to share a vulnerability I found in KiwiTCMS. also my first CVE (CVE-2023–36809)
hack and bug bounty
If things go right, make sure it’s a trap, How the hackers are caught?
Medium
If things go right, make sure it’s a trap, How the hackers are caught?
In today’s interconnected world, cybersecurity has become a top priority for organizations of all sizes. As cyber threats continue to…
hack and bug bounty
“Embarking on the Ethical Hacking Journey: A Comprehensive Beginner’s Guide”
Medium
“Embarking on the Ethical Hacking Journey: A Comprehensive Beginner’s Guide”
In the dynamic realm of cybersecurity, ethical hacking stands as a formidable defense against digital threats. Whether you’re motivated by…
hack and bug bounty
Cross Site Scripting -XSS
Medium
Cross Site Scripting -XSS
🌐
🌐
What is Cross-Site Scripting (XSS)
🌐
? Cross-Site Scripting (XSS) is a type of security vulnerability that occurs when an attacker injects…
hack and bug bounty
CVE-2023–38646 — Metabase Pre-Auth RCE
Medium
CVE-2023–38646 — Metabase Pre-Auth RCE
Summary
hack and bug bounty
Defending the Digital World: An Introduction to Cybersecurity
Medium
Defending the Digital World: An Introduction to Cybersecurity
Suppose you’re a veteran or teacher interested in transitioning to a career in cybersecurity. In that case, you may wonder what…
hack and bug bounty
Top 5 best hackers in the world
Medium
Top 5 best hackers in the world
. Welcome to our list of the top 5 hackers in the world. At the age of juvenile, information and data rule supreme due to. Hackers have many skills that lead them to negative complex systems and…
hack and bug bounty
Unveiling the Cipher Quest: How Cybersleut Experts Reclaim Hacked Bitcoin Wallets and Fortify Your…
Medium
Unveiling the Cipher Quest: How Cybersleut Experts Reclaim Hacked Bitcoin Wallets and Fortify Your…
INTRODUCTION: