hack and bug bounty
@hack_com
22
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
22 subscribers
hack and bug bounty
TryHackMe-Fowsniff CTF(WriteUp)
Medium
TryHackMe-Fowsniff CTF(WriteUp)
Hey Guys! Welcome to the 2nd CTF challenge writeup. Let’s Go.
hack and bug bounty
New Quick Write up -.- :
Medium
New Quick Write up -.- :
hack and bug bounty
Everything You Need To Know About Vulnerability Assessment
Medium
Everything You Need To Know About Vulnerability Assessment
In today’s rapidly evolving digital landscape, where technology advancements drive businesses and communication, ensuring the security of…
hack and bug bounty
Top 11 Strategies To Boost Followers Count On Platform Twitter In 2023
Medium
Top 11 Strategies To Boost Followers Count On Platform Twitter In 2023
Twitter’s name change to X has created a buzz among netizens. As per Elon Musk, Twitter was acquired by X Corp to ensure freedom of speech…
hack and bug bounty
RCE via Account Takeover
Medium
RCE via Account Takeover
In this blog, I am gonna share about a bug that I came across while performing VAPT for a private project.
This is a CMS website that I…
hack and bug bounty
Escalating XSS with CRLF to Account Takeover (without stealing the Session token)
Medium
Escalating XSS with CRLF to Account Takeover (without stealing the Session token)
Hi Everyone,
hack and bug bounty
Discovering ADHUBLLKA Ransomware Family: Tracing Roots of LOLKEK, BIT, OBZ, U2K TZW Variants
Medium
Discovering ADHUBLLKA Ransomware Family: Tracing Roots of LOLKEK, BIT, OBZ, U2K TZW Variants
NOTE: The original work is attributed to NETENRICH Corporation. Here, you can find the official version. This article is not an in-depth…
hack and bug bounty
Gaining Remote Server Access: Buffer Overflows — Part 2/ 2
Medium
Gaining Remote Server Access: Buffer Overflows — Part 2/ 2
Depending on how secure a remote server is, some of the simplest attacks could give you access, like a buffer overflow. Continued…
hack and bug bounty
MY first bug bounty via Parameter Mining
Medium
MY first bug bounty via Parameter Mining
$Whoami
hack and bug bounty
2.2 Lab: 2FA simple bypass using Burpsuite— 2023
Medium
2.2 Lab: 2FA simple bypass using Burpsuite— 2023
This lab’s two-factor authentication can be bypassed. To solve the lab, access Carlos’s account page | Karthikeyan Nagaraj
hack and bug bounty
API Recon ️♂️With Google Dorks
Medium
API Recon
🕵️♂️
With Google Dorks
Exploring Google Dorking Queries to Enhance API Security
🔒
hack and bug bounty
Basic Reconnaissance Techniques: Gathering Information Ethically
Medium
Basic Reconnaissance Techniques: Gathering Information Ethically
In the realm of ethical hacking, reconnaissance, often referred to as the “information gathering” phase, is the crucial first step. To…
hack and bug bounty
XSS + Firewall Bypass And Detection
Medium
XSS + Firewall Bypass And Detection
Bug Bounty POC Preparation Guide For XSS Vulnerability
hack and bug bounty
Self-learning to bug Bounty
Medium
Self-learning to bug Bounty
Self-learning big bounty
hack and bug bounty
Threat Modeling Handbook #2: Threat modeling is a process, not a document
Medium
Threat Modeling Handbook #2: Threat modeling is a process, not a document
Welcome back to the 2nd story in the “Threat Modeling Handbook” series. In the last story, we discussed what is a threat model and why it…
hack and bug bounty
Hacking India’s Biggest Fintech Provider With a Simple IDOR
Medium
Hacking India’s Biggest Fintech Provider With a Simple IDOR
Unveiling the Threat of IDOR Vulnerabilities By Hacking a Fintech Provider Ethically
hack and bug bounty
Beyond the Surface: The Dangers of Malicious PDFs
Medium
Beyond the Surface: The Dangers of Malicious PDFs
PDFs have become an essential part of our digital world, facilitating seamless document sharing across platforms. However, with the rise of…
hack and bug bounty
PG Play — DC-4 | 63/100
Medium
PG Play — DC-4 | 63/100
Hi! Today I’m working on the machine DC-4 from Proving Grounds Play / VulnHub. This is writeup 63 out of 100 as I prepare for OSCP. This…
hack and bug bounty
How to Become an Ethical Hacker Without a Degree in 2023
Medium
How to Become an Ethical Hacker Without a Degree in 2023
Achieving the status of an ethical hacker without a degree may appear overwhelming. However, it is entirely feasible by adopting the…
hack and bug bounty
The Role of AI and Machine Learning in Next-Gen Application Security Architecture
Medium
The Role of AI and Machine Learning in Next-Gen Application Security Architecture
In today’s rapidly evolving technological landscape, the emergence of sophisticated cyber threats and attacks has brought to the forefront…