hack and bug bounty
@hack_com
22
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
22 subscribers
hack and bug bounty
My $1000 Bounty Bug: How I Stopped Companies from Losing Money with an IDOR Flaw
Medium
My $1000 Bounty Bug: How I Stopped Companies from Losing Money with an IDOR Flaw
Discover the intriguing tale of how I stumbled upon an IDOR (Insecure Direct Object Reference) vulnerability in Examfit’s (Virtual Name of private program)Expense Validation system, and how this flaw…
hack and bug bounty
How to Scan Subdomains using Python
Medium
How to Scan Subdomains using Python
In this article, I will show you how you can code your own subdomain scanner using the Python programming language. Finding subdomains of a…
hack and bug bounty
AppSec Tales XVIII | Open Redirect
Medium
AppSec Tales XVIII | Open Redirect
Application Security Testing for the Unvalidated Redirects and Forwards.
hack and bug bounty
10 2FA Bypasses Discovered on a Single Program and Page
Medium
10 2FA Bypasses Discovered on a Single Program and Page
In this article, I will talk about how I managed to discover over 10 2FA Bypasses on a Single Program and Page
hack and bug bounty
TryHackMe-Vulnversity(WriteUp)
Medium
TryHackMe-Vulnversity(WriteUp)
Hey Guys! What’s up! I know for the naughty ones, it’s sky cause’ I am one of them. (LOL)
Ok! Let’s go.
hack and bug bounty
A Step-by-Step Guide to Mobile Hacking Using Ngrok and Metasploit
Medium
A Step-by-Step Guide to Mobile Hacking Using Ngrok and Metasploit
Disclaimer: This guide is intended for educational purposes only. Unauthorized hacking is illegal and unethical. Always obtain proper…
hack and bug bounty
DIY Onocoy Ntrip Server and Reference Station Setup
Medium
DIY Onocoy Ntrip Server and Reference Station Setup
“DIY Onocoy Ntrip Server and Reference Station Setup” is published by SimeonOnSecurity.
hack and bug bounty
Mastering Bug Bounty Hunting: A Comprehensive Methodology by Shubham Tiwari
Medium
Mastering Bug Bounty Hunting: A Comprehensive Methodology by Shubham Tiwari
Introduction: In the realm of cybersecurity, bug bounty hunting has evolved into a dynamic and rewarding pursuit. Join me, Shubham Tiwari…
hack and bug bounty
Understanding Cross-Site Scripting (XSS) Vulnerability: Impact, Types, and Mitigation
Medium
Understanding Cross-Site Scripting (XSS) Vulnerability: Impact, Types, and Mitigation
Introduction:
Cross-Site Scripting (XSS) is a web application vulnerability that allows attackers to inject malicious scripts into web…
hack and bug bounty
Find Your Cybersecurity Calling: Pick a Path That Excites You
Medium
Find Your Cybersecurity Calling: Pick a Path That Excites You
Are you passionate about cybersecurity but struggling to figure out which career path to pursue? With so many options available, deciding…
hack and bug bounty
Source THM Box Writeup
Medium
Source THM Box Writeup
In Every Penetration testing engagement we start with recon, thereby we start by scanning the target for open ports.
hack and bug bounty
“Unleashing the Quantum Potential: Supercomputing’s Bold Odyssey”
Medium
“Unleashing the Quantum Potential: Supercomputing’s Bold Odyssey”
Amid the luminous hum of servers, where the echo of countless algorithms orchestrates a symphony of digital possibilities, an uncharted…
hack and bug bounty
Navigating the Digital Threads: Unleashing the Potential of Burp Suite’s Spider Tool in Bug Bounty…
Medium
Navigating the Digital Threads: Unleashing the Potential of Burp Suite’s Spider Tool in Bug Bounty…
In the ever-evolving landscape of cybersecurity, where the lines between offense and defense are blurred, bug bounty programs stand as…
hack and bug bounty
Understanding the Benefits of Using Tails Linux for Penetration Testing
Medium
Understanding the Benefits of Using Tails Linux for Penetration Testing
Introduction
hack and bug bounty
Understanding the Benefits of Using Kali Linux for Penetration Testing
Medium
Understanding the Benefits of Using Kali Linux for Penetration Testing
Introduction
hack and bug bounty
Guide to Creating and Using APIs with PHP
Medium
Guide to Creating and Using APIs with PHP
APIs (Application Programming Interfaces) have become a fundamental aspect of modern web development, enabling disparate systems to…
hack and bug bounty
InfoSecSherpa’s News Roundup for Saturday, August 26, 2023
Medium
InfoSecSherpa’s News Roundup for Saturday, August 26, 2023
InfoSecSherpa: Your Guide Up a Mountain of Information!
hack and bug bounty
TryHackMe - Chocolate Factory
Medium
TryHackMe - Chocolate Factory
TryHackMe sitesinde bulunan Chocolate Factory CTF’ine buradan ulaşabilirsiniz. Bu yazıda, ilgili odayı çözerken izlediğim yolları derledim.
hack and bug bounty
Vuln-web-lab
Medium
Vuln-web-lab
Hello evreyone, I developed a simple lab with intentional security vulnerabilities.
hack and bug bounty
Linux Security — AppArmor (Application Armor)
Medium
Linux Security — AppArmor (Application Armor)
“AppArmor” (Application Armor) is an LSM (https://medium.com/@boutnaru/linux-security-lsm-linux-security-modules-907bbcf8c8b4) which…