hack and bug bounty
@hack_com
22
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
22 subscribers
hack and bug bounty
Azure subdomain takeover step by step!
Medium
Azure subdomain takeover step by step!
Today I scanned some subdomain list via nuclei. I received a info like this:
hack and bug bounty
How to Get Unique Subdomains on Large scope
Medium
How to Get Unique Subdomains on Large scope
how to Get The Uniq Subdomains on a big Subdomains list. to print unique ones only
hack and bug bounty
Password Cracking: Create a custom password list with cupp
Medium
Password Cracking: Create a custom password list with cupp
If the hacker is able to obtain or crack the target’s password, in many cases, this can lead to a complete breach and takeover of the…
hack and bug bounty
How I Passed OSCP 2023 in Just 8 Hours with 110 Points Without Using Metasploit
Medium
How I Passed OSCP 2023 in Just 8 Hours with 110 Points Without Using Metasploit
Hey everyone, If you’ve ever been curious about how to pass OffSec Certified Professional (OSCP) exam and get certified so this blog is for…
hack and bug bounty
Application Security Services Market Size, Trends, Outlook and Forecast
Medium
Application Security Services Market Size, Trends, Outlook and Forecast
hack and bug bounty
Brooklyn Nine-Nine — TryHackMe WriteUp
Medium
Brooklyn Nine-Nine — TryHackMe WriteUp
This room Brooklyn Nine Nine from TryHackMe is aimed for beginner level hackers but anyone can try to hack this box. There are two main…
hack and bug bounty
Reflected XSS At U.S. Government
Medium
Reflected XSS At U.S. Government
Hey there, im mandar parekh from DDU,NADIAD. so basically it’s my first writeup,so i’m not having much experience for it and also im…
hack and bug bounty
NoSQL Injection Redis
Medium
NoSQL Injection Redis
Hello friends today, what is Redis? ,I will give a brief explanation about what Redisson advantages are.
hack and bug bounty
Understanding SQL and SQL Injection — 8 | 2023
Medium
Understanding SQL and SQL Injection — 8 | 2023
Unveiling the Intricacies of SQL and Guarding Against SQL Injection Attacks | Karthikeyan Nagaraj
hack and bug bounty
«Кража» со взломом: пентест финансовой организации
Medium
«Кража» со взломом: пентест финансовой организации
В этом посте мы расскажем, как сломанная логика, самописные сервисы и графические пароли могут привести к захвату сетевой инфраструктуры…
hack and bug bounty
Mastering the CompTIA Security+ Exam: Your Gateway to a Secure IT Career
Medium
Mastering the CompTIA Security+ Exam: Your Gateway to a Secure IT Career
Cybersecurity is crucial in a world that is becoming more and more digital. The hazards to our digital assets grow as technology does as…
hack and bug bounty
(IDOR) How do I find the first vulnerability with a $2500 bounty on hackerone
Medium
(IDOR) How do I find the first vulnerability with a $2500 bounty on hackerone
Hello everyone, my name is Muhamad Iman Follow my Linkedin. I was new to ethical hacking about five months ago.
hack and bug bounty
Linux Local Enumeration
Medium
Linux Local Enumeration
This blog will help you After gaining initial access to a target system, it is always important to learn more about the system like os…
hack and bug bounty
Getting Started with Web Application Security Testing Using Burp Suite
Medium
Getting Started with Web Application Security Testing Using Burp Suite
In an era where digital landscapes dominate business operations, the security of web applications has become a critical concern. A single…
hack and bug bounty
I’m a Hacker
Medium
I’m a Hacker
What does that mean anyway?
hack and bug bounty
CVE-2023–32315 — Path Traversal in Openfire leads to RCE
Medium
CVE-2023–32315 — Path Traversal in Openfire leads to RCE
A Analysis for CVE-2023–32315 which was Path Traversal in openfire.
hack and bug bounty
Exploit in /mellon/logout?ReturnTo= : 50$~200$
Medium
Exploit in /mellon/logout?ReturnTo= : 50$~200$
first let me introduce you to this new bug bounty plateform that i found and im in love with it .
hack and bug bounty
Memutuskan Antara Ethical Hacking dan Penetration Testing: Jalur Mana yang Harus Dipilih?
Medium
Memutuskan Antara Ethical Hacking dan Penetration Testing: Jalur Mana yang Harus Dipilih?
Dalam bidang cybersecurity, ada banyak kesempatan karier, termasuk ethical hacker dan penetration tester. Namun, siapakah sebenarnya para profesional ini? Untuk mempelajari identitas mereka, mari…
hack and bug bounty
InfoSecSherpa’s News Roundup for Thursday, August 17, 2023
Medium
InfoSecSherpa’s News Roundup for Thursday, August 17, 2023
InfoSecSherpa: Your Guide Up a Mountain of Information!
hack and bug bounty
Maximizing CIAM Investments: A Layered Approach to API Security
Medium
Maximizing CIAM Investments: A Layered Approach to API Security
I was happy to join a group of industry experts for a great discussion at The European Identity and Cloud Conference recently. Ingo…