hack and bug bounty
@hack_com
22
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
22 subscribers
hack and bug bounty
Crack the Code: Your Ultimate Guide to Blind XSS Injection with bxss
Medium
Crack the Code: Your Ultimate Guide to Blind XSS Injection with bxss
Welcome to our YouTube video on “Unmasking bxss: Your Ultimate Guide to Blind XSS Injection.” In this tutorial, we will delve into the…
hack and bug bounty
Nikto Introduction — Web Application Security
Medium
Nikto Introduction — Web Application Security
Nikto is a vulnerability scanner part of Kali Linux and is widely used to find vulnerabilities in Web servers. It performs various tasks, including: All information, techniques, and tools described…
hack and bug bounty
Secure Code Review (SCR) : A7 — Missing Function Level Access Control
Medium
Secure Code Review (SCR): A7 — Missing Function Level Access Control
In the vast landscape of web application vulnerabilities, Missing Function Level Access Control stands out as a significant concern. It…
hack and bug bounty
Continuous Improvement: Adapting Application Security Architecture to Emerging Threats
Medium
Continuous Improvement: Adapting Application Security Architecture to Emerging Threats
In today’s rapidly evolving digital landscape, the role of application security has never been more crucial. With the constant emergence of…
hack and bug bounty
Windows — Sessions
Medium
Windows — Sessions
Every process started on a system belongs to a specific user maintained by an access token…
hack and bug bounty
Ethical Hacking Learning Path — A Complete Roadmap
Medium
Ethical Hacking Learning Path — A Complete Roadmap
1. Fundamentals:
hack and bug bounty
Fortify Your Digital Fortress: VAPT Security Testing Services
Medium
Fortify Your Digital Fortress: VAPT Security Testing Services
In an era where digital vulnerabilities lurk around every corner, safeguarding your digital assets has never been more critical. Welcome to…
hack and bug bounty
Secure code review process in 4 steps
Medium
Secure code review process in 4 steps
How it seen by an application security engineer
hack and bug bounty
The CJEU Declares the EU-US Privacy Shield Invalid and SCCs Valid
Medium
The CJEU Declares the EU-US Privacy Shield Invalid and SCCs Valid
On 16 July 2020, the Court of Justice of the European Union (CJEU) made a significant ruling concerning the adequacy of the EU-US Privacy…
hack and bug bounty
Upgrade with Confidence — Windows Server 2012 R2 End of Life
Medium
Upgrade with Confidence — Windows Server 2012 R2 End of Life
With every day that passes, the inescapable end draws closer: On October 10, 2023, the time has come, Windows Server 2012/R2 will finally…
hack and bug bounty
Hacking a Tapo TC60 Camera
Medium
Hacking a Tapo TC60 Camera
A little while ago, I spotted a Tapo TC60 “Smart Security Camera” on sale at Amazon UK. After my adventures with a smart lockbox and an old…
hack and bug bounty
Beginner’s Guide to Basic Linux Commands
Medium
Beginner’s Guide to Basic Linux Commands
Linux is a powerful and versatile operating system. For those new to Linux, understanding its commands is essential for effective…
hack and bug bounty
Cyber Briefing:2023.08.23
Medium
Cyber Briefing:2023.08.23
👉
What’s trending in cybersecurity today? Agniane Stealer, Malware, Cryptocurrencies, Spacecolon Toolset, Ransomware, OfficeNote, macOS…
hack and bug bounty
THM — RazorBlack | 60/100
Medium
THM — RazorBlack | 60/100
Howdy! Back at it today with CTF writeup 60 out of a planned 100. This time I’m working on RazorBlack from TryHackMe. This was a fun…
hack and bug bounty
Auto Nuclei Updater
Medium
Auto Nuclei Updater
NucleiUpdater is an Automation Tool that Update Nuclei with Single Command on terminal as nucleiupdate.
hack and bug bounty
Types of Authentication Vulnerability in Web Applications
Medium
Types of Authentication Vulnerability in Web Applications
Understanding Authentication Vulnerabilities | Karthike
hack and bug bounty
Adobe Announces Researcher Hall of Fame Initiative for Security Researchers
Medium
Adobe Announces Researcher Hall of Fame Initiative for Security Researchers
By Daniel Ventura, Manager of Product Security Incident Response Team (PSIRT)
hack and bug bounty
If You Can Read It, You Can Break It
Medium
If You Can Read It, You Can Break It
Deobfuscation In Action
hack and bug bounty
My Journey: From Aspiring Ethical Hacker to “Hacker of the Month” on TryHackMe
Medium
My Journey: From Aspiring Ethical Hacker to “Hacker of the Month” on TryHackMe
Hello readers, Welcome to my new blog! I’m Tahir Mujawar, a Certified Ethical Hacker, and I’m thrilled to have this opportunity to share my…
hack and bug bounty
Gaining Remote Server Access: Buffer Overflows — Part 1 / 2
Medium
Gaining Remote Server Access: Buffer Overflows — Part 1 / 2
Depending on how secure a remote server is, some of the simplest attacks could give you access, like a buffer overflow.