hack and bug bounty
@hack_com
21
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
21 subscribers
hack and bug bounty
Hunting 0days for a better world
Medium
Hunting 0days for a better world
How finding CVE will protect your communities.
hack and bug bounty
Taking your web application pentesting to another level
Medium
Taking your web application pentesting to another level
By making use of Bchecks in Burp suite
hack and bug bounty
Exploring the World of Bug Bounty with Burp Suite: Unveiling the Digital Hunt for Vulnerabilities
Medium
Exploring the World of Bug Bounty with Burp Suite: Unveiling the Digital Hunt for Vulnerabilities
In the ever-evolving landscape of cybersecurity, the battle between hackers and defenders wages on. One of the most intriguing aspects of…
hack and bug bounty
Twitter to x ?
Medium
Twitter to x ?
On July 25, 2023, Elon Musk, the new owner of Twitter, announced that he was changing the name of the company to X.
hack and bug bounty
What is RCE? An Exploration — 4 | 2023
Medium
What is RCE? An Exploration — 4 | 2023
Unraveling the Intricacies of Remote Code Execution (RCE) | Karthikeyan Nagaraj
hack and bug bounty
Sensitive Information Leakage via Log File
Medium
Sensitive Information Leakage via Log File
Hey there! It’s been a while since I published on Medium…
In this article, I will introduce you to my steps in finding a “Sensitive…
hack and bug bounty
Prevent CSRF Attacks Via Same-Site cookie attribute
Medium
Prevent CSRF Attacks Via Same-Site cookie attribute
What is CSRF: Cross-Site Request Forgery (CSRF) is a type of attack that occurs when a malicious web site or program causes a user’s web…
hack and bug bounty
InfoSecSherpa’s News Roundup for Sunday, August 13, 2023
Medium
InfoSecSherpa’s News Roundup for Sunday, August 13, 2023
InfoSecSherpa: Your Guide Up a Mountain of Information!
hack and bug bounty
Surfer TryHackMe Write-Up
Medium
Surfer TryHackMe Write-Up
hack and bug bounty
Special Characters Manipulating in BugBounty
Medium
title
Special Characters in BugBounty Hunting Write-up
hack and bug bounty
Critical Thinking Episode 31: Alex Chapman - The Man of Many Crits
hack and bug bounty
Secure Your Business Network: Top 5 Expert Tips
Medium
Secure Your Business Network: Top 5 Expert Tips
In today’s fast-paced digital landscape, businesses rely heavily on interconnected networks to drive operations, streamline communication…
hack and bug bounty
“ BEST BITCOIN RECOVERY EXPERT ”
Medium
“ BEST BITCOIN RECOVERY EXPERT ”
“ BEST BITCOIN RECOVERY EXPERT “
(Cybergenie(@)cyberservices(.)com)
(+1 (252) 512–0391)
Losing $287,000 worth of Bitcoin to crypto broker…
hack and bug bounty
Going Beyond Penetration Testing: The Evolution of Purple Teaming
Medium
Going Beyond Penetration Testing: The Evolution of Purple Teaming
In today’s interconnected world, the importance of securing digital systems and networks cannot be overstated. Organizations face constant…
hack and bug bounty
The value of attentive AppSec vendors
Medium
The value of attentive AppSec vendors
Application security vendors that listen to their customers and release hot fixes provide a valuable service to their clients. By being…
hack and bug bounty
How I Owned A Domain Admin Account Before Lunch.
Medium
How I Owned A Domain Admin Account Before Lunch.
A few months ago, I was engaged in an internal pentest. I initiated the pentest by kicking off a routine nmap scan to enumerate endpoints…
hack and bug bounty
The Ultimate Guide to Money Earning Apps for Mobile Devices
Medium
The Ultimate Guide to Money Earning Apps for Mobile Devices
Explore the innovative earning potential of PawnsApp”> PawnsApp , a platform that offers a distinctive opportunity to generate income using your mobile device. Through a combination of sharing your…
hack and bug bounty
Comparativa entre CEH y eJPT: Analizando Ventajas, Desventajas y Factores Clave
Medium
Comparativa entre CEH y eJPT: Analizando Ventajas, Desventajas y Factores Clave
En el mundo actual impulsado por la tecnología, la seguridad cibernética se ha convertido en una preocupación primordial para individuos y…
hack and bug bounty
Getting Started with Bug Bounty Hunting: Essential Tools and Resources
Medium
Getting Started with Bug Bounty Hunting: Essential Tools and Resources
Bug bounty hunting, which enables people to find and report vulnerabilities in various systems and applications, has evolved as an…
hack and bug bounty
Websites are often subjected to attacks designed to damage or recover data that under normal…
Medium
Websites are often subjected to attacks designed to damage or recover data that under normal…
One of the simplest, but also most widespread types of attacks on security gaps that we find in modern web applications (Web apps) is SQL…