hack and bug bounty
@hack_com
22
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
22 subscribers
hack and bug bounty
How I passed the 2023 OSCP exam on my first attempt with a perfect score
Medium
How I passed the 2023 OSCP exam on my first attempt with a perfect score
**Spoiler alert: A lot of hard work.**
hack and bug bounty
Gathering information for social engineering attack cyber security
Medium
Gathering information for social engineering attack cyber security
Social engineering attacks are one of the most dangerous attacks among us. If you are associated with the field of cyber security, then you…
hack and bug bounty
My experience with BugBase copilot
Medium
My experience with BugBase copilot
My first experience with bugbase pentest copilot (AI)
hack and bug bounty
Unlocking Offensive Security with John the Ripper (JtR): A Guide to Get Started with JtR
Medium
Unlocking Offensive Security with John the Ripper (JtR): A Guide to Get Started with JtR
In the realm of information and data security, John the Ripper, often abbreviated as JtR, stands as a formidable tool in the arsenal of…
hack and bug bounty
Lian_Yu Write-Up
Medium
Lian_Yu Write-Up
💡
Uma boa wordlist: directory-list-2.3-medium.txt encontrada em /usr/share/wordlists/dirbuster/
hack and bug bounty
Exploring Network Security with Aircrack-ng: A Comprehensive Guide
Medium
Exploring Network Security with Aircrack-ng: A Comprehensive Guide
In today’s interconnected world, where wireless networks have become the backbone of our digital interactions, safeguarding their security…
hack and bug bounty
Zipping (Intended + unintended way)— HackTheBox Medium machine — By Amdjed Zerrougui
Medium
Zipping (Intended + unintended way)— HackTheBox Medium machine — By Amdjed Zerrougui
Hello fellow hackers, since almost everyone solved this machine using an unintended way (file upload abuse), I decided to share this…
hack and bug bounty
S3 Bucket Recon
Medium
S3 Bucket Recon
Here’s a list of common tools and methods you can use to perform S3 bucket Recon.
👇
hack and bug bounty
How to install Foundry to debug smart contracts (Part 1)
Medium
How to install Foundry to debug smart contracts (Part 1)
Learn how to deploy and debug easily any smart contract on the Ethereum blockchain.
hack and bug bounty
Understanding SQL Injection: The Silent Threat to Web Security
Medium
Understanding SQL Injection: The Silent Threat to Web Security
Introduction
hack and bug bounty
Covenant C2: The .NET Command & Control Powerhouse
Medium
Covenant C2: The .NET Command & Control Powerhouse
In the vast and dynamic world of cybersecurity, the battle between attackers and defenders is never-ending. To effectively combat threats…
hack and bug bounty
Understanding Practical SQL Injection: Core Concepts and Techniques
Medium
Understanding Practical SQL Injection: Core Concepts and Techniques (Beginners to Advanced)
Learn SQL basics from online tutorials, courses, or books. Best courses can be found for free on youtube. You must get started and learn core sql concepts and foundations of the topic very well…
hack and bug bounty
Malware Prevalence
Medium
Malware Prevalence
Proof of Concept: Malware creation
hack and bug bounty
Insecure Direct Object Reference (IDOR) at Fitur Delete Account
Medium
Insecure Direct Object Reference (IDOR) at Fitur Delete Account
Hei everyone..
hack and bug bounty
Lenskart Data Leak: Unveiling Critical Security Breach in Spring Boot Configuration
Medium
Lenskart Data Leak: Unveiling Critical Security Breach in Spring Boot Configuration
In an age where personal data security is of paramount importance, a recent discovery has highlighted a concerning incident involving the…
hack and bug bounty
RootMe TryHackMe Walkthrough
Medium
RootMe TryHackMe Walkthrough
Hey guys!! Today I’m back with another box “Root Me” from TryHackMe. I’ll guide you through the steps I took, the challenges I faced while…
hack and bug bounty
Task 5: Network Scanning with Nmap
Medium
🌐
Task 5: Network Scanning with Nmap
Using Nmap to scan, enumerate, and analyze network hosts and services.
hack and bug bounty
Stop Studying Hacking
Medium
Stop Studying Hacking
Are you stuck in a never-ending cycle of studying hacking, but never really hacking? Then It’s time to break free from that cycle.
hack and bug bounty
Webinar Pro or Not: The $500 Access Control Bug
Medium
Webinar Pro or Not: The $500 Access Control Bug
Discover how, I uncovered a $500 access control bug allowing unauthorized webinar creation. Learn about the implications, responsible…
hack and bug bounty
AppSec Tales XIX | CRLF
Medium
AppSec Tales XIX | CRLF
Application Security Testing for Carriage Return Line Feed injections.