hack and bug bounty
@hack_com
22
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
22 subscribers
hack and bug bounty
ALL ABOUT XSS CROSS SITE SCRIPTING — BASIC KNOWLEDGE
Medium
ALL ABOUT XSS CROSS SITE SCRIPTING — BASIC KNOWLEDGE
What is XSS?
hack and bug bounty
IoT binary analysis & emulation part -1
Medium
IoT binary analysis & emulation part -1
QEMU Emulation Types
hack and bug bounty
Unveiling Mobile App Security: A Comprehensive Guide
Medium
Unveiling Mobile App Security: A Comprehensive Guide
1.1: What is Mobile AppSec — An Introduction
hack and bug bounty
A Beginner’s Guide to Nmap
Medium
A Beginner’s Guide to Nmap
This GitHub repo is made for all, ranging from beginners in cybersecurity to cybersecurity experts. This is beginner-friendly, so don’t…
hack and bug bounty
Time Based Blind SQL Injection on MYSQL : How To Do Manually
Medium
Time Based Blind SQL Injection on MYSQL : How To Do Manually
Time-based techniques are often used to achieve tests when there is no other way to retrieve information from the database server. This…
hack and bug bounty
Binary Exploitation | ROP attack
Medium
Binary Exploitation | ROP attack
hack and bug bounty
Buffer Overflow via Environment Variables | Binary-Exploitation
Medium
Buffer Overflow via Environment Variables | Binary-Exploitation
25 Jan
hack and bug bounty
All about: Open Redirects Attack
Medium
All about: Open Redirects Attack
Sites often use HTTP or URL parameters to redirect users to a specified URL without any user action. While this behavior can be useful, it…
hack and bug bounty
Phone number OSINT: My methodology for investigations
Medium
Phone number OSINT: My methodology for investigations
Hey guys, so I think this would be one of the most awaited blogs as it’s on a topic that we all are interested in. This blog is not just on…
hack and bug bounty
Stack-Overflow | Shellcode-Injection
Medium
Stack-Overflow | Shellcode-Injection
Shellcode | Buffer-overflow
hack and bug bounty
Exploring the Depths of the Dark Web: Activities, Risks, and Safety Measures
Medium
Exploring the Depths of the Dark Web: Activities, Risks, and Safety Measures
Explore the hidden world of the Dark Web, from illicit trade to digital anarchy, in the latest edition of DefenSave Newsletter. #DarkWeb
hack and bug bounty
My first Bug finding in Apple website
Medium
My first Bug finding in Apple website
It all began with a mix-up, a simple mistake that turned out to be quite lucky. Instead of intercepting what I intended, I accidentally…
hack and bug bounty
Unleash the power of reverse SOCKS5 tunnel in your corporate red teaming and adversary emulation…
Medium
Unleash the power of reverse SOCKS5 tunnel in your corporate red teaming and adversary emulation…
While commercial EDR solutions have undoubtedly strengthened cyber defence capabilities, they also introduce significant challenges for…
hack and bug bounty
X Slows Down Access to Rival Sites and News Outlets, Then Backtracks
Medium
X Slows Down Access to Rival Sites and News Outlets, Then Backtracks
X, the social media platform formerly known as Twitter, faced backlash on Monday after it was revealed that it had temporarily slowed down…
hack and bug bounty
Aleo’s Security Endeavors: Introduction of a Comprehensive Bug Bounty Program
Medium
Aleo’s Security Endeavors: Introduction of a Comprehensive Bug Bounty Program
About five weeks ago, Aleo made waves in the crypto community by revealing its plans to kickstart a Bug Bounty Program, collaborating with…
hack and bug bounty
Unmasking Vulnerabilities: Exploring the Convergence of Robotics and Cybersecurity
Medium
Unmasking Vulnerabilities: Exploring the Convergence of Robotics and Cybersecurity
🤖
What if a cyber attack happened to robotics?
🤔
hack and bug bounty
Easy Peasy — TryHackMe WriteUp
Medium
Easy Peasy — TryHackMe WriteUp
Greetings, avid learners!
🌟
In this article, we’re diving headfirst into the realm of TryHackMe a room called Easy Peasy, where we’ll…
hack and bug bounty
Types of RCE in Brief: Exploring Remote Code Execution Vulnerabilities — 7| 2023
Medium
Types of RCE in Brief: Exploring Remote Code Execution Vulnerabilities — 7| 2023
Types of RCE Vulnerabilities Demystified: Safeguarding Your Systems from Remote Code Execution Threats
hack and bug bounty
Best Application Security Practices
Medium
Best Application Security Practices
As the software development timeline shrinks, developers face pressure to release the latest features rapidly. They rely on third-party…
hack and bug bounty
Ethical Hacking for Beginners and Prominent Career Paths in Cybersecurity
Medium
Ethical Hacking for Beginners and Prominent Career Paths in Cybersecurity
In this era of technology, it is vital to recognize the significance of cybersecurity. The increasing complexity of cyber threats and…