hack and bug bounty
@hack_com
22
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
22 subscribers
hack and bug bounty
Safeguarding Digital Frontiers: The Power of VAPT Security Audit Services
Medium
Safeguarding Digital Frontiers: The Power of VAPT Security Audit Services
In an era where digital transformation is reshaping industries, ensuring the security of your digital assets is paramount. Vulnerability…
hack and bug bounty
5 Skills To Learn Before Ethical Hacking!
Medium
5 Skills To Learn Before Ethical Hacking!
How You’ll Start To Be an “Ethical Hacking”?
hack and bug bounty
Top 10 Websites for Hacking Practice!
Medium
Top 10 Websites for Hacking Practice!
Hey there, future cybersecurity extraordinaires!
🕵️♂️
Ready to dive into the world of hacking practice? Don’t worry, we’re not talking…
hack and bug bounty
Elon Musk’s Ambitious Political Endeavor on X
Medium
Elon Musk’s Ambitious Political Endeavor on X
In his bid to position X Corp. as a central player in the 2024 election campaign, billionaire entrepreneur Elon Musk faces a range of…
hack and bug bounty
Understanding Hyperlink Injection Vulnerability: Risks and Prevention
Medium
Understanding Hyperlink Injection Vulnerability: Risks and Prevention
Hello,
hack and bug bounty
Check for alive domains faster, and get report in seconds using isitup
Medium
Check for alive domains faster, and get report in seconds using isitup
Introduction
hack and bug bounty
Why Not To Automate Security in SDLC?
Medium
Why not to automate security in SDLC?
Presenting arguments that security can be easily integrated with SDLC process with example tools configured.
hack and bug bounty
Uncovering Vulnerabilities: Security Flaws Discovered on the Indian Prime Minister’s Website
Medium
Uncovering Vulnerabilities: Security Flaws Discovered on the Indian Prime Minister’s Website
Hello geeks, Biswajeet Ray Here, Security Engineer, OSINT & Threat Analyst.
hack and bug bounty
Generate Rainbow Tables faster with Python | Hasher 2023
Medium
Generate Rainbow Tables faster with Python | Hasher 2023
Introduction
hack and bug bounty
Spiderfoot — One of best OSINT tools
Medium
Spiderfoot — One of best OSINT tools
What is Spiderfoot?
hack and bug bounty
From Economics to Ethical Hacking: My Uphill Journey to Achieving an Unconventional Dream
Medium
From Economics to Ethical Hacking: My Uphill Journey to Achieving an Unconventional Dream
Growing up, I was always enchanted by technology. So much so that as a child, I would craft laptops from paper, pretending to type away…
hack and bug bounty
Social Engineering Awareness: Protecting Yourself and Others from Manipulation
Medium
Social Engineering Awareness: Protecting Yourself and Others from Manipulation
In the complex world of cyber threats, a dangerous thread is running through — the art of social engineering. This article delves into the…
hack and bug bounty
Series of Web Exploits: From Discovery to Disclosure — XSS fun
Medium
Series of Web Exploits: From Discovery to Disclosure — XSS fun
(No Bounty PAID :@, no thanks, and over 10 XSS)
hack and bug bounty
Bluetooth: Sniffing and Cracking Bluetooth with the UbertoothOne
Medium
Bluetooth: Sniffing and Cracking Bluetooth with the UbertoothOne
One of my favourite TV shows is Person of interest. I was just finishing up my Computer science degree when the show first started airing I…
hack and bug bounty
How a Shodan search led to Gold Mine :)
Medium
How a Shodan search led to Gold Mine :)
Hi Amazing readers, hope y’all are doing well
😊
. This is my 1st ever blog so please let me know any spelling or grammatical mistakes in…
hack and bug bounty
The Legal and Ethical Aspects of Ethical Hacking: Navigating Gray Areas
Medium
The Legal and Ethical Aspects of Ethical Hacking: Navigating Gray Areas
In the rapidly evolving landscape of technology and cybersecurity, the concept of ethical hacking occupies a unique space. While ethical…
hack and bug bounty
NMap Essentials: How to get started
Medium
NMap Essentials: How to get started
Hi everyone. Getting started with cyber security can be overwhelming. There are so many tools, techniques and theory to get you started…
hack and bug bounty
What is TCP/IP Model
Medium
What is TCP/IP Model
The TCP/IP model serves as a framework for visualizing the organization and transmission of data across a network.
hack and bug bounty
The Dark Side of AI: How Growing Applications Could Fuel Cybersecurity Threats
Medium
The Dark Side of AI: How Growing Applications Could Fuel Cybersecurity Threats
PamC
hack and bug bounty
How DevSecOps Teams Should Approach API Security
Medium
How DevSecOps Teams Should Approach API Security
A recommended setup that addresses the unique concerns of developers, security and DevOps teams.