hack and bug bounty
@hack_com
22
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
22 subscribers
hack and bug bounty
How Is Cybersecurity Analytics Revolutionizing the Industry
Medium
How Is Cybersecurity Analytics Revolutionizing the Industry
Did you know?
hack and bug bounty
How could we hack all organizations within a web app
Medium
How could we hack all organizations within a web app
Assalaamu’alaikum wa rahmatullah wabarakatuhu
hack and bug bounty
New 0-day vulnerabilities caught up
Medium
New 0-day vulnerabilities caught up
Two 0-day vulnerabilities (Bitforge) have been detected recently. They allow hackers to drain cryptocurrency from popular wallets in mere…
hack and bug bounty
PCI DSS: Pros and Cons of Outsourcing
Medium
PCI DSS: Pros and Cons of Outsourcing
Whether to Outsource the Storage, Processing, and Transmission of Cardholder Data
hack and bug bounty
Twitter’s Logo Transformation: Exploring the ‘X’ and Fond Memories of the Bird
Medium
Twitter’s Logo Transformation: Exploring the ‘X’ and Fond Memories of the Bird
In a bold move earlier this year, precisely in April, Twitter unveiled a significant transformation of its logo — bidding farewell to the…
hack and bug bounty
Basic of SSRF
Medium
Basic of SSRF
Hello There,
hack and bug bounty
Hacking Active Directory: Forest
Medium
Hacking Active Directory: Forest
Step into the HTB Forest Write-Up! Within this article, we delve into the conquest of an approachable Windows box graded as…
hack and bug bounty
Exploring Remote Code Execution (RCE): Unveiling Vulnerabilities and Defenses — 5 | 2023
Medium
Exploring Remote Code Execution (RCE): Unveiling Vulnerabilities and Defenses — 5 | 2023
Unveiling the Threat Landscape of Remote Code Execution | Karthikeyan Nagaraj
hack and bug bounty
HTB — Monteverde | 51/100
Medium
HTB — Monteverde | 51/100
Hi! Another day, another CTF writeup. Today I’ll be working on Monteverde, a Medium rated box from HackTheBox. This was a really cool…
hack and bug bounty
Navigating the Evolving API Landscape: Insights From the New Stack and the API Context Maturity…
Medium
Navigating the Evolving API Landscape: Insights From the New Stack and the API Context Maturity Model
In a recent article published by The New Stack, Eric Newcomer poses an intriguing question: “API Management Is a Commodity: What’s Next?”…
hack and bug bounty
Xamarin — Reversing de aplicaciones Android
Medium
Xamarin — Reversing de aplicaciones Android
Xamarin es un framework de desarrollo de aplicaciones móviles que permite crear apps nativas para iOS y Android utilizando un lenguaje de…
hack and bug bounty
What can freelancers learn from the rebranding of twitter to X and how can these learnings help to…
Medium
What can freelancers learn from the rebranding of twitter to X and how can these learnings help to…
Rebranding is a significant step for any company, and there are several key takeaways that freelancers can learn from such initiatives to…
hack and bug bounty
PEN-300 OSEP Review — Offensive Security Experienced Penetration Tester
Medium
PEN-300 OSEP Review — Offensive Security Experienced Penetration Tester
Earlier this year, I passed the Offensive Security Experienced Penetration Tester (OSEP) certification exam. As with other 300-level courses from OffSec, this was a practical 48-hour exam following…
hack and bug bounty
Hacker’s Preference: Python!
Medium
Hacker’s Preference: Python!
Compelling factors propelling Python’s remarkable rise in popularity within the hacker community
hack and bug bounty
THM: Surfer
Medium
THM: Surfer
Woah, check out this radical app! Isn’t it narly dude? We’ve been surfing through some webpages and we want to get you on board too! They said this application has some functionality that is only…
hack and bug bounty
Protect your online/digital reputation against cyber-blackmail with the help of cybersecurity…
Medium
Protect your online/digital reputation against cyber-blackmail with the help of cybersecurity…
Protect your online/digital reputation against cyber-blackmail with the help of cybersecurity experts Introduction Our lives are deeply entwined with technology in the digital age, which offers us…
hack and bug bounty
Arcadia Joins ‘Skin in the Game,’ Enhancing Trust and Security in the Web3 Ecosystem
Medium
Arcadia Joins ‘Skin in the Game,’ Enhancing Trust and Security in the Web3 Ecosystem
In a significant move towards a more secure and trusted web3 environment, Arcadia, a prestigious web3 auditing and security company, has…
hack and bug bounty
Maximizing ROI: Why Investing in Purple Teaming Makes Sense
Medium
Maximizing ROI: Why Investing in Purple Teaming Makes Sense
In the ever-evolving landscape of cybersecurity, organizations face an ongoing battle to protect their digital assets from increasingly…
hack and bug bounty
THM — Epoch | 52/100
Medium
THM — Epoch | 52/100
Hi! Here is a writeup of Epoch from TryHackMe. This was a very beginner box that featured a command injection vulnerability which we were…
hack and bug bounty
Build no infrastructure, then we’ll talk
Medium
Build no infrastructure, then we’ll talk
We’re in this strange ol’ time where it feels like so many aspects of our lives are maintained by ubiquitous, real-time connectivity to the…