hack and bug bounty
@hack_com
22
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
22 subscribers
hack and bug bounty
Beyond the Surface: The Dangers of Malicious PDFs
Medium
Beyond the Surface: The Dangers of Malicious PDFs
PDFs have become an essential part of our digital world, facilitating seamless document sharing across platforms. However, with the rise of…
hack and bug bounty
PG Play — DC-4 | 63/100
Medium
PG Play — DC-4 | 63/100
Hi! Today I’m working on the machine DC-4 from Proving Grounds Play / VulnHub. This is writeup 63 out of 100 as I prepare for OSCP. This…
hack and bug bounty
How to Become an Ethical Hacker Without a Degree in 2023
Medium
How to Become an Ethical Hacker Without a Degree in 2023
Achieving the status of an ethical hacker without a degree may appear overwhelming. However, it is entirely feasible by adopting the…
hack and bug bounty
The Role of AI and Machine Learning in Next-Gen Application Security Architecture
Medium
The Role of AI and Machine Learning in Next-Gen Application Security Architecture
In today’s rapidly evolving technological landscape, the emergence of sophisticated cyber threats and attacks has brought to the forefront…
hack and bug bounty
InfoSecSherpa’s News Roundup for Friday, August 25, 2023
Medium
InfoSecSherpa’s News Roundup for Friday, August 25, 2023
InfoSecSherpa: Your Guide Up a Mountain of Information!
hack and bug bounty
Threads users wanted a web or desktop version of the app, and now they’re getting it.
Medium
Threads users wanted a web or desktop version of the app, and now they’re getting it.
Users noticed a significant omission after Meta released the Threads app: a web version. Did Meta release a web version in response to the…
hack and bug bounty
Поглиблений огляд програми винагород за знахідку багів від Aleo
Medium
Поглиблений огляд програми винагород за знахідку багів від Aleo
Ключові моменти:
hack and bug bounty
From Zero to Hero in Ethical Hacking: Unlocking the Core Topics That Motivate You to Cybersecurity…
Medium
From Zero to Hero in Ethical Hacking: Unlocking the Core Topics That Motivate You to Cybersecurity…
Introduction
hack and bug bounty
From Black Hats to White Hats: The Rise of Ethical Hacking
Medium
From Black Hats to White Hats: The Rise of Ethical Hacking
Introduction:
hack and bug bounty
2.3 Lab: Password reset broken logic using Burpsuite | 2023
Medium
2.3 Lab: Password reset broken logic using Burpsuite | 2023
This lab’s password reset functionality is vulnerable. To solve the lab, reset Carlos’s password then log in and access his “My account”…
hack and bug bounty
Privilege Escalation to Super Admin
Medium
Privilege Escalation to Super Admin
💪
Hey hackers!!! Hope u all are doing very well in you life. Today I will be sharing about a Privilege Escalation vulnerability I found on a client’s website. I found a Privilege Escalation bug with…
hack and bug bounty
My $1000 Bounty Bug: How I Stopped Companies from Losing Money with an IDOR Flaw
Medium
My $1000 Bounty Bug: How I Stopped Companies from Losing Money with an IDOR Flaw
Discover the intriguing tale of how I stumbled upon an IDOR (Insecure Direct Object Reference) vulnerability in Examfit’s (Virtual Name of private program)Expense Validation system, and how this flaw…
hack and bug bounty
How to Scan Subdomains using Python
Medium
How to Scan Subdomains using Python
In this article, I will show you how you can code your own subdomain scanner using the Python programming language. Finding subdomains of a…
hack and bug bounty
AppSec Tales XVIII | Open Redirect
Medium
AppSec Tales XVIII | Open Redirect
Application Security Testing for the Unvalidated Redirects and Forwards.
hack and bug bounty
10 2FA Bypasses Discovered on a Single Program and Page
Medium
10 2FA Bypasses Discovered on a Single Program and Page
In this article, I will talk about how I managed to discover over 10 2FA Bypasses on a Single Program and Page
hack and bug bounty
TryHackMe-Vulnversity(WriteUp)
Medium
TryHackMe-Vulnversity(WriteUp)
Hey Guys! What’s up! I know for the naughty ones, it’s sky cause’ I am one of them. (LOL)
Ok! Let’s go.
hack and bug bounty
A Step-by-Step Guide to Mobile Hacking Using Ngrok and Metasploit
Medium
A Step-by-Step Guide to Mobile Hacking Using Ngrok and Metasploit
Disclaimer: This guide is intended for educational purposes only. Unauthorized hacking is illegal and unethical. Always obtain proper…
hack and bug bounty
DIY Onocoy Ntrip Server and Reference Station Setup
Medium
DIY Onocoy Ntrip Server and Reference Station Setup
“DIY Onocoy Ntrip Server and Reference Station Setup” is published by SimeonOnSecurity.
hack and bug bounty
Mastering Bug Bounty Hunting: A Comprehensive Methodology by Shubham Tiwari
Medium
Mastering Bug Bounty Hunting: A Comprehensive Methodology by Shubham Tiwari
Introduction: In the realm of cybersecurity, bug bounty hunting has evolved into a dynamic and rewarding pursuit. Join me, Shubham Tiwari…
hack and bug bounty
Understanding Cross-Site Scripting (XSS) Vulnerability: Impact, Types, and Mitigation
Medium
Understanding Cross-Site Scripting (XSS) Vulnerability: Impact, Types, and Mitigation
Introduction:
Cross-Site Scripting (XSS) is a web application vulnerability that allows attackers to inject malicious scripts into web…