hack and bug bounty
@hack_com
22
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
22 subscribers
hack and bug bounty
Unlocking Offensive Security with John the Ripper (JtR): A Guide to Get Started with JtR
Medium
Unlocking Offensive Security with John the Ripper (JtR): A Guide to Get Started with JtR
In the realm of information and data security, John the Ripper, often abbreviated as JtR, stands as a formidable tool in the arsenal of…
hack and bug bounty
Lian_Yu Write-Up
Medium
Lian_Yu Write-Up
💡
Uma boa wordlist: directory-list-2.3-medium.txt encontrada em /usr/share/wordlists/dirbuster/
hack and bug bounty
Exploring Network Security with Aircrack-ng: A Comprehensive Guide
Medium
Exploring Network Security with Aircrack-ng: A Comprehensive Guide
In today’s interconnected world, where wireless networks have become the backbone of our digital interactions, safeguarding their security…
hack and bug bounty
Zipping (Intended + unintended way)— HackTheBox Medium machine — By Amdjed Zerrougui
Medium
Zipping (Intended + unintended way)— HackTheBox Medium machine — By Amdjed Zerrougui
Hello fellow hackers, since almost everyone solved this machine using an unintended way (file upload abuse), I decided to share this…
hack and bug bounty
S3 Bucket Recon
Medium
S3 Bucket Recon
Here’s a list of common tools and methods you can use to perform S3 bucket Recon.
👇
hack and bug bounty
How to install Foundry to debug smart contracts (Part 1)
Medium
How to install Foundry to debug smart contracts (Part 1)
Learn how to deploy and debug easily any smart contract on the Ethereum blockchain.
hack and bug bounty
Understanding SQL Injection: The Silent Threat to Web Security
Medium
Understanding SQL Injection: The Silent Threat to Web Security
Introduction
hack and bug bounty
Covenant C2: The .NET Command & Control Powerhouse
Medium
Covenant C2: The .NET Command & Control Powerhouse
In the vast and dynamic world of cybersecurity, the battle between attackers and defenders is never-ending. To effectively combat threats…
hack and bug bounty
Understanding Practical SQL Injection: Core Concepts and Techniques
Medium
Understanding Practical SQL Injection: Core Concepts and Techniques (Beginners to Advanced)
Learn SQL basics from online tutorials, courses, or books. Best courses can be found for free on youtube. You must get started and learn core sql concepts and foundations of the topic very well…
hack and bug bounty
Malware Prevalence
Medium
Malware Prevalence
Proof of Concept: Malware creation
hack and bug bounty
Insecure Direct Object Reference (IDOR) at Fitur Delete Account
Medium
Insecure Direct Object Reference (IDOR) at Fitur Delete Account
Hei everyone..
hack and bug bounty
Lenskart Data Leak: Unveiling Critical Security Breach in Spring Boot Configuration
Medium
Lenskart Data Leak: Unveiling Critical Security Breach in Spring Boot Configuration
In an age where personal data security is of paramount importance, a recent discovery has highlighted a concerning incident involving the…
hack and bug bounty
RootMe TryHackMe Walkthrough
Medium
RootMe TryHackMe Walkthrough
Hey guys!! Today I’m back with another box “Root Me” from TryHackMe. I’ll guide you through the steps I took, the challenges I faced while…
hack and bug bounty
Task 5: Network Scanning with Nmap
Medium
🌐
Task 5: Network Scanning with Nmap
Using Nmap to scan, enumerate, and analyze network hosts and services.
hack and bug bounty
Stop Studying Hacking
Medium
Stop Studying Hacking
Are you stuck in a never-ending cycle of studying hacking, but never really hacking? Then It’s time to break free from that cycle.
hack and bug bounty
Webinar Pro or Not: The $500 Access Control Bug
Medium
Webinar Pro or Not: The $500 Access Control Bug
Discover how, I uncovered a $500 access control bug allowing unauthorized webinar creation. Learn about the implications, responsible…
hack and bug bounty
AppSec Tales XIX | CRLF
Medium
AppSec Tales XIX | CRLF
Application Security Testing for Carriage Return Line Feed injections.
hack and bug bounty
Ethical Hacking 101: Your Gateway to Cybersecurity
Medium
Ethical Hacking 101: Your Gateway to Cybersecurity
Greetings, future ethical hackers and cybersecurity enthusiasts! Welcome to the exciting world of ethical hacking, where you’ll embark on a…
hack and bug bounty
How Google Dorks is used by hackers to gain the sensitive information
Medium
How Google Dorks is used by hackers to gain the sensitive information
inurl = the URL of a site you want to querydomain = the domain for the sitedorks = the sub-fields and parameters that a hacker wants to scan We can also use other search filed than URL that will help…
hack and bug bounty
X and Your Data
Medium
X and Your Data
Elon Musk’s vision for an “Everything App” appears to be taking shape with X, formerly known as Twitter. The platform plans to introduce…