hack and bug bounty
@hack_com
22
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
22 subscribers
hack and bug bounty
Protect your online/digital reputation against cyber-blackmail with the help of cybersecurity…
Medium
Protect your online/digital reputation against cyber-blackmail with the help of cybersecurity…
Protect your online/digital reputation against cyber-blackmail with the help of cybersecurity experts Introduction Our lives are deeply entwined with technology in the digital age, which offers us…
hack and bug bounty
Arcadia Joins ‘Skin in the Game,’ Enhancing Trust and Security in the Web3 Ecosystem
Medium
Arcadia Joins ‘Skin in the Game,’ Enhancing Trust and Security in the Web3 Ecosystem
In a significant move towards a more secure and trusted web3 environment, Arcadia, a prestigious web3 auditing and security company, has…
hack and bug bounty
Maximizing ROI: Why Investing in Purple Teaming Makes Sense
Medium
Maximizing ROI: Why Investing in Purple Teaming Makes Sense
In the ever-evolving landscape of cybersecurity, organizations face an ongoing battle to protect their digital assets from increasingly…
hack and bug bounty
THM — Epoch | 52/100
Medium
THM — Epoch | 52/100
Hi! Here is a writeup of Epoch from TryHackMe. This was a very beginner box that featured a command injection vulnerability which we were…
hack and bug bounty
Build no infrastructure, then we’ll talk
Medium
Build no infrastructure, then we’ll talk
We’re in this strange ol’ time where it feels like so many aspects of our lives are maintained by ubiquitous, real-time connectivity to the…
hack and bug bounty
Quick Guide for cyber security Pen Testing that can help :)
Medium
Quick Guide for cyber security Pen Testing that can help :)
If you are new and you want to learn everything from scratch this tutorial help you to understand thing Cyber Security and with basic…
hack and bug bounty
Performance testing of AppSec tools
Medium
Performance testing of AppSec tools
Performance testing of Application Security tools prior to production release is valuable because it helps to ensure that the tools are…
hack and bug bounty
InfoSecSherpa’s News Roundup for Monday, August 14, 2023
Medium
InfoSecSherpa’s News Roundup for Monday, August 14, 2023
InfoSecSherpa: Your Guide Up a Mountain of Information!
hack and bug bounty
Navigating Ethical Hacking: Your Path to Becoming a Cybersecurity Professional
Medium
Navigating Ethical Hacking: Your Path to Becoming a Cybersecurity Professional
The field of ethical hacking offers an engaging introduction to cybersecurity, where people defend digital environments by comprehending…
hack and bug bounty
DNS Spoofing Attack Using Python
Medium
DNS Spoofing Attack Using Python
In this article, I will demonstrate how you can execute a DNS Spoofing Attack using the Python Language. First, we will implement an ARP…
hack and bug bounty
Windows — Securable Objects
Medium
Windows — Securable Objects
Overall, “securable objects” are Windows objects (https://medium.com/@boutnaru/windows-objects-2c289da600bf) that can have a “security…
hack and bug bounty
Unveiling Vulnerabilities: Host-header injection in OAuth Functionality
Medium
Unveiling Vulnerabilities: Host-header injection in OAuth Functionality
Introduction
hack and bug bounty
Critical XSS Vulnerability in Workflowy
Medium
Critical XSS Vulnerability in Workflowy
Exposes Users to Unauthorized Code Execution and Information Disclosure: Immediate Caution Advised
hack and bug bounty
Exploiting URL-Based Access Control: A Lab Analysis
Medium
Exploiting URL-Based Access Control: A Lab Analysis
Introduction: Greetings, infosec researchers!
hack and bug bounty
A Journey Close to RCE in Nokia
Medium
A Journey Close to RCE in Nokia
Hello everyone. In this article, I will share the story of how I came very close to discovering an RCE (Remote Code Execution)…
hack and bug bounty
Top 10 Subdomain Finders for Great Website Reconnaissance in Bug Bounty
Medium
Top 10 Subdomain Finders for Great Website Reconnaissance in Bug Bounty
Subdomain enumeration is the process of finding #subdomains of a particular domain. Subdomain Finder is a useful tool to help discover…
hack and bug bounty
Zuckerberg Dismisses Musk’s Cage Fight Proposal as a Mere Spectacle
Medium
Zuckerberg Dismisses Musk’s Cage Fight Proposal as a Mere Spectacle
Mark Zuckerberg has publicly stated that Elon Musk’s proposal for a cage fight is not a serious endeavor and suggests it’s time to move on…
hack and bug bounty
This is Leonidas, he is deploying an application online and needs to be sure that application…
Medium
This is Leonidas, he is deploying an application online and needs to be sure that application…
He does not look like an application administrator. Don’t judge!
hack and bug bounty
Benefits of PCI DSS Compliance
Medium
Benefits of PCI DSS Compliance
Every organization that handles credit card information, whether they store, process, or transmit it, is required to comply with the PCI…
hack and bug bounty
X (Formerly Twitter) To Roll Out Video And Audio Calling Features.
Medium
X (Formerly Twitter) To Roll Out Video And Audio Calling Features.
In its ongoing evolution into X, Twitter’s CEO, Linda Yaccarino, has confirmed that a forthcoming feature will allow platform users to…