hack and bug bounty
@hack_com
22
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
22 subscribers
hack and bug bounty
How to intercept Paytm Android App Network Traffic using Burp and Frida?
Medium
How to intercept Paytm Android App Network Traffic using Burp and Frida?
In this blog will show you how you can intercept Paytm’s network traffic and access HTTPS requests in plain text, Tools required Burp Suite
hack and bug bounty
RCE on Application’s Tracking Admin Panel
Medium
RCE on Application’s Tracking Admin Panel
In this blog post, we’ll explore some intriguing scenarios where the add extension functionality in a particular subdomain can be exploited to enable a Remote Code Execution vulnerability. The…
hack and bug bounty
RCE on Tracking Application’s Admin panel
hack and bug bounty
What is NGINX and How to install in Ubuntu/CentOS and Mac.
Medium
What is NGINX and How to install in Ubuntu/CentOS and Mac.
What is NGINX?
hack and bug bounty
Secure FastAPI with eBPF
Medium
Secure FastAPI with eBPF
Leverage eBPF to secure internet-facing APIs: FastAPI, BlackSheep, Flask, Django, aiohttp, tornado, and more.
hack and bug bounty
Bypass WAF by a simple trick gained $1000 bounty
Medium
Bypass WAF by a simple trick gained $1000 bounty
Hi all….
hack and bug bounty
Building a Red Team Cyber Range: Our Lab Architecture.
Medium
Building a Red Team Cyber Range: Our Lab Architecture.
From our first part of this series found here, we explored the concept of a Red Team Range and its invaluable benefits for both seasoned…
hack and bug bounty
Understanding and Exploiting Business Logic Vulnerability in Web App Penetration Testing | 2023
Medium
Understanding and Exploiting Business Logic Vulnerability in Web App Penetration Testing | 2023
Unveiling the Hidden Threats of Business logic Vulnerabilities in Web Application Security | Karthikeyan Nagaraj
hack and bug bounty
Byte-ing the Bullet: Tripping, Tumbling, and Triumphing: My Journey to Cyber Proficiency!
Medium
Byte-ing the Bullet: Tripping, Tumbling, and Triumphing: My Journey to Cyber Proficiency!
The Backstory Buffet: A Hearty Serving of Me
hack and bug bounty
A Year of Hunting into Vulnerability Disclosure programs (VDPs)
Medium
A Year of Hunting into Vulnerability Disclosure programs (VDPs)
How I only hunted on open VDPs and gained immense knowledge in the process.
hack and bug bounty
MrRobot Blue Team Challenge | Cyberdefenders.org
Medium
MrRobot Blue Team Challenge | Cyberdefenders.org
Hello and welcome!
😁
hack and bug bounty
THM — Opacity | 71/100
Medium
THM — Opacity | 71/100
Hi! Today I’m working on Opacity from TryHackMe. This was an Easy rated machine that was pretty challenging and had some cool concepts in…
hack and bug bounty
Exploring SAST, DAST, and IAST for Safer Software Development
Medium
Exploring SAST, DAST, and IAST for Safer Software Development
Unlocking the Trio of Security Testing
hack and bug bounty
Sobre as diferenças entre bug bounty e pentest
Medium
Sobre as diferenças entre bug bounty e pentest
Principais diferenças entre as abordagens
hack and bug bounty
InfoSecSherpa’s News Roundup for Sunday, September 3, 2023
Medium
InfoSecSherpa’s News Roundup for Sunday, September 3, 2023
InfoSecSherpa: Your Guide Up a Mountain of Information!
hack and bug bounty
Android Penetration Tryz — Part 2
Medium
Android Penetration Tryz — Part 2
Android Penetration Tryz Part 2
hack and bug bounty
The Unseen Threats: Understanding Physical Penetration Testing in a Digital World
Medium
The Unseen Threats: Understanding Physical Penetration Testing in a Digital World
Unlocking the Secrets of Physical Security: Delve into the Art of Physical Penetration Testing and Equip Yourself with the Hacker Mindset.
hack and bug bounty
Strongly securing public APIs
Medium
How to strongly secure public APIs using HMAC
There is no general authentication method for all types of API. It depends on the API purpose. The API might provide sensitive services…
hack and bug bounty
Experiment #8 (Can You Spot Me?)
Medium
Experiment #8 (Can You Spot Me?)
You have been using APIs, modelling them into DTOs, or even using GraphQL to only fetch what you need. Chances are, you are now an expert…
hack and bug bounty
Some vulnerabilities are invisible
Medium
Some vulnerabilities are invisible
Picture the future of technology. Do you visualize all-powerful AI overlords ruling humanity? Perhaps you imagine a world where our…