hack and bug bounty
@hack_com
21
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
21 subscribers
hack and bug bounty
How I Owned A Domain Admin Account Before Lunch.
Medium
How I Owned A Domain Admin Account Before Lunch.
A few months ago, I was engaged in an internal pentest. I initiated the pentest by kicking off a routine nmap scan to enumerate endpoints…
hack and bug bounty
The Ultimate Guide to Money Earning Apps for Mobile Devices
Medium
The Ultimate Guide to Money Earning Apps for Mobile Devices
Explore the innovative earning potential of PawnsApp”> PawnsApp , a platform that offers a distinctive opportunity to generate income using your mobile device. Through a combination of sharing your…
hack and bug bounty
Comparativa entre CEH y eJPT: Analizando Ventajas, Desventajas y Factores Clave
Medium
Comparativa entre CEH y eJPT: Analizando Ventajas, Desventajas y Factores Clave
En el mundo actual impulsado por la tecnología, la seguridad cibernética se ha convertido en una preocupación primordial para individuos y…
hack and bug bounty
Getting Started with Bug Bounty Hunting: Essential Tools and Resources
Medium
Getting Started with Bug Bounty Hunting: Essential Tools and Resources
Bug bounty hunting, which enables people to find and report vulnerabilities in various systems and applications, has evolved as an…
hack and bug bounty
Websites are often subjected to attacks designed to damage or recover data that under normal…
Medium
Websites are often subjected to attacks designed to damage or recover data that under normal…
One of the simplest, but also most widespread types of attacks on security gaps that we find in modern web applications (Web apps) is SQL…
hack and bug bounty
How to make a Payload that is not detected by Antivirus
Medium
How to make a Payload that is not detected by Antivirus
hack and bug bounty
WiFi Hacking with Airgeddon on Kali Linux
Medium
WiFi Hacking with Airgeddon on Kali Linux
In today’s educational guide, we will see how to hack or “break” Wifi codes with simple steps. In other words, how will I get internet from…
hack and bug bounty
Upgrade simple terminal to Meterpreter terminal
Medium
Upgrade simple terminal to Meterpreter terminal
hack and bug bounty
Crack SSH Private Key with John the Ripper
Medium
Crack SSH Private Key with John the Ripper
The SSH private key code should not be just a decoration. Unfortunately, some people think they will never lose their SSH private key and…
hack and bug bounty
Subfinder | Find the hidden Subdomains of any Website
Medium
Subfinder | Find the hidden Subdomains of any Website
In today’s guide we will see how we can discover hidden subdomains on a website with the help of Subfinder.
hack and bug bounty
Top 10 Phishing Tools
Medium
Top 10 Phishing Tools
Phishing is deception energy of internet users, in which the ‘offender’ impersonates a trusted entity, abusing the insufficient protection…
hack and bug bounty
Securing the Agile Journey: A Guide to Successful DevSecOps Implementation Hands-On ( Part-2 )
Medium
Securing the Agile Journey: A Guide to Successful DevSecOps Implementation Hands-On ( Part-2 )
Weaving security into every process.
hack and bug bounty
AppSec Tales XVI | File Inclusion
Medium
AppSec Tales XVI | File Inclusion
Application Security Testing for the File Inclusion vulnerabilities.
hack and bug bounty
Steganography: Hide messages in image and audio files
Medium
Steganography: Hide messages in image and audio files
hack and bug bounty
Bettercap: Hacking Attacks on Bluetooth Devices
Medium
Bettercap: Hacking Attacks on Bluetooth Devices
hack and bug bounty
Packet Sniffer for Windows: Intercept local network data
Medium
Packet Sniffer for Windows: Intercept local network data
A local network, e.g. drinking a coffee and connected to the store’s Wifi, it is vulnerable to interception attacks on our data. In today’s…
hack and bug bounty
Man-in-the-Middle Attack using ARP Poisoning
Medium
Man-in-the-Middle Attack using ARP Poisoning
hack and bug bounty
Decoding The 79% Drop In Android Usage for Instagram Threads In One Month.
Medium
Decoding The 79% Drop In Android Usage for Instagram Threads In One Month.
Recent data reveals a significant decline in the daily active users of Instagram’s Threads app on Android, contrasting with the upward…
hack and bug bounty
Android Application Links and iOS Universal Links: A More Secure Way to Deep Link
Medium
Android Application Links and iOS Universal Links: A More Secure Way to Deep Link
Background
hack and bug bounty
SQL injection in Apache Airflow MySQL provider (CVE-2023–22884) — PoC + exploit
Medium
SQL injection in Apache Airflow MySQL provider (CVE-2023–22884) — PoC + exploit
Proof of Concept for CVE-2023–22884 that is an Apache Airflow SQL injection vulnerability.