hack and bug bounty
@hack_com
21
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
21 subscribers
hack and bug bounty
Quackerjack write-up — Proving Grounds, Get To Work
Medium
Quackerjack write-up — Proving Grounds, Get To Work
Write up for Quackerjack, an intermediate level machine from Proving Grounds (PG) by OffSec.
hack and bug bounty
How I Discovered Over 40+ Impactful Vulnerabilities Within 1 Hour, Just for Fun!
Medium
How I Discovered Over 40+ Impactful Vulnerabilities Within 1 Hour, Just for Fun!
Hello, I’m Takshal, aka tojojo. I hope you all are doing well. Today, I’m excited to share my journey of finding more than 40+ impactful…
hack and bug bounty
Improper Neutralization of Input During Web Page Generation, Stored XSS in KiwiTCMS…
Medium
Improper Neutralization of Input During Web Page Generation, Stored XSS in KiwiTCMS…
Hi everyone
👋🏻
, Today I would like to share a vulnerability I found in KiwiTCMS. also my first CVE (CVE-2023–36809)
hack and bug bounty
If things go right, make sure it’s a trap, How the hackers are caught?
Medium
If things go right, make sure it’s a trap, How the hackers are caught?
In today’s interconnected world, cybersecurity has become a top priority for organizations of all sizes. As cyber threats continue to…
hack and bug bounty
“Embarking on the Ethical Hacking Journey: A Comprehensive Beginner’s Guide”
Medium
“Embarking on the Ethical Hacking Journey: A Comprehensive Beginner’s Guide”
In the dynamic realm of cybersecurity, ethical hacking stands as a formidable defense against digital threats. Whether you’re motivated by…
hack and bug bounty
Cross Site Scripting -XSS
Medium
Cross Site Scripting -XSS
🌐
🌐
What is Cross-Site Scripting (XSS)
🌐
? Cross-Site Scripting (XSS) is a type of security vulnerability that occurs when an attacker injects…
hack and bug bounty
CVE-2023–38646 — Metabase Pre-Auth RCE
Medium
CVE-2023–38646 — Metabase Pre-Auth RCE
Summary
hack and bug bounty
Defending the Digital World: An Introduction to Cybersecurity
Medium
Defending the Digital World: An Introduction to Cybersecurity
Suppose you’re a veteran or teacher interested in transitioning to a career in cybersecurity. In that case, you may wonder what…
hack and bug bounty
Top 5 best hackers in the world
Medium
Top 5 best hackers in the world
. Welcome to our list of the top 5 hackers in the world. At the age of juvenile, information and data rule supreme due to. Hackers have many skills that lead them to negative complex systems and…
hack and bug bounty
Unveiling the Cipher Quest: How Cybersleut Experts Reclaim Hacked Bitcoin Wallets and Fortify Your…
Medium
Unveiling the Cipher Quest: How Cybersleut Experts Reclaim Hacked Bitcoin Wallets and Fortify Your…
INTRODUCTION:
hack and bug bounty
Hunting 0days for a better world
Medium
Hunting 0days for a better world
How finding CVE will protect your communities.
hack and bug bounty
Taking your web application pentesting to another level
Medium
Taking your web application pentesting to another level
By making use of Bchecks in Burp suite
hack and bug bounty
Exploring the World of Bug Bounty with Burp Suite: Unveiling the Digital Hunt for Vulnerabilities
Medium
Exploring the World of Bug Bounty with Burp Suite: Unveiling the Digital Hunt for Vulnerabilities
In the ever-evolving landscape of cybersecurity, the battle between hackers and defenders wages on. One of the most intriguing aspects of…
hack and bug bounty
Twitter to x ?
Medium
Twitter to x ?
On July 25, 2023, Elon Musk, the new owner of Twitter, announced that he was changing the name of the company to X.
hack and bug bounty
What is RCE? An Exploration — 4 | 2023
Medium
What is RCE? An Exploration — 4 | 2023
Unraveling the Intricacies of Remote Code Execution (RCE) | Karthikeyan Nagaraj
hack and bug bounty
Sensitive Information Leakage via Log File
Medium
Sensitive Information Leakage via Log File
Hey there! It’s been a while since I published on Medium…
In this article, I will introduce you to my steps in finding a “Sensitive…
hack and bug bounty
Prevent CSRF Attacks Via Same-Site cookie attribute
Medium
Prevent CSRF Attacks Via Same-Site cookie attribute
What is CSRF: Cross-Site Request Forgery (CSRF) is a type of attack that occurs when a malicious web site or program causes a user’s web…
hack and bug bounty
InfoSecSherpa’s News Roundup for Sunday, August 13, 2023
Medium
InfoSecSherpa’s News Roundup for Sunday, August 13, 2023
InfoSecSherpa: Your Guide Up a Mountain of Information!
hack and bug bounty
Surfer TryHackMe Write-Up
Medium
Surfer TryHackMe Write-Up
hack and bug bounty
Special Characters Manipulating in BugBounty
Medium
title
Special Characters in BugBounty Hunting Write-up