hack and bug bounty
@hack_com
22
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
22 subscribers
hack and bug bounty
Understanding and Exploiting Business Logic Vulnerability in Web App Penetration Testing | 2023
Medium
Understanding and Exploiting Business Logic Vulnerability in Web App Penetration Testing | 2023
Unveiling the Hidden Threats of Business logic Vulnerabilities in Web Application Security | Karthikeyan Nagaraj
hack and bug bounty
Byte-ing the Bullet: Tripping, Tumbling, and Triumphing: My Journey to Cyber Proficiency!
Medium
Byte-ing the Bullet: Tripping, Tumbling, and Triumphing: My Journey to Cyber Proficiency!
The Backstory Buffet: A Hearty Serving of Me
hack and bug bounty
A Year of Hunting into Vulnerability Disclosure programs (VDPs)
Medium
A Year of Hunting into Vulnerability Disclosure programs (VDPs)
How I only hunted on open VDPs and gained immense knowledge in the process.
hack and bug bounty
MrRobot Blue Team Challenge | Cyberdefenders.org
Medium
MrRobot Blue Team Challenge | Cyberdefenders.org
Hello and welcome!
😁
hack and bug bounty
THM — Opacity | 71/100
Medium
THM — Opacity | 71/100
Hi! Today I’m working on Opacity from TryHackMe. This was an Easy rated machine that was pretty challenging and had some cool concepts in…
hack and bug bounty
Exploring SAST, DAST, and IAST for Safer Software Development
Medium
Exploring SAST, DAST, and IAST for Safer Software Development
Unlocking the Trio of Security Testing
hack and bug bounty
Sobre as diferenças entre bug bounty e pentest
Medium
Sobre as diferenças entre bug bounty e pentest
Principais diferenças entre as abordagens
hack and bug bounty
InfoSecSherpa’s News Roundup for Sunday, September 3, 2023
Medium
InfoSecSherpa’s News Roundup for Sunday, September 3, 2023
InfoSecSherpa: Your Guide Up a Mountain of Information!
hack and bug bounty
Android Penetration Tryz — Part 2
Medium
Android Penetration Tryz — Part 2
Android Penetration Tryz Part 2
hack and bug bounty
The Unseen Threats: Understanding Physical Penetration Testing in a Digital World
Medium
The Unseen Threats: Understanding Physical Penetration Testing in a Digital World
Unlocking the Secrets of Physical Security: Delve into the Art of Physical Penetration Testing and Equip Yourself with the Hacker Mindset.
hack and bug bounty
Strongly securing public APIs
Medium
How to strongly secure public APIs using HMAC
There is no general authentication method for all types of API. It depends on the API purpose. The API might provide sensitive services…
hack and bug bounty
Experiment #8 (Can You Spot Me?)
Medium
Experiment #8 (Can You Spot Me?)
You have been using APIs, modelling them into DTOs, or even using GraphQL to only fetch what you need. Chances are, you are now an expert…
hack and bug bounty
Some vulnerabilities are invisible
Medium
Some vulnerabilities are invisible
Picture the future of technology. Do you visualize all-powerful AI overlords ruling humanity? Perhaps you imagine a world where our…
hack and bug bounty
Fortifying Email Security: The Trifecta of DMARC, SPF, and DKIM
Medium
Fortifying Email Security: The Trifecta of DMARC, SPF, and DKIM
Email is among the primary communication methods businesses and individuals rely on. However, its ubiquitous nature also makes it a popular…
hack and bug bounty
How to Spam Bank Logs in 2022 | General Spamming guide and best tutorial
Medium
How to Spam Bank Logs in 2022 | General Spamming guide and best tutorial
Website: Buydumpscvv.com — Spamming bank logs To spam bank logs, you need a phishing website to convince targets to compromise their…
hack and bug bounty
The importance of AppSec security log retainment for root cause analysis
Medium
The importance of AppSec security log retainment for root cause analysis
Retaining logs is a critical component of any successful cybersecurity strategy. Log retention refers to the archiving of event logs…
hack and bug bounty
Ataque de Bilhões de Risadas
Medium
Ataque de Bilhões de Risadas
O “Ataque de Bilhões de Risadas” (Billion Laughs Attack), também conhecido como “XML Bomb”, é uma forma de ataque DDOS
hack and bug bounty
Gencard.py: Generación de tarjetas ficticias validas con el algoritmo de Luhn para probar pasarelas…
Medium
Gencard.py: Generación de tarjetas ficticias validas con el algoritmo de Luhn para probar pasarelas…
Introducción
hack and bug bounty
A GUIDE TO CASHOUT BANK LOGS WITH GUARANTEED SUCCESS 2022
Medium
A GUIDE TO CASHOUT BANK LOGS WITH GUARANTEED SUCCESS 2022
Visit Buydumpscvv.com HOW TO CASHOUT BANK LOGS 2022. ACH — Automated clearing house, is an electronic network for financial transactions
hack and bug bounty
Vulnerability Insecure Direct Object Reference (IDOR) at Update Profile Leads to Account Takeover
Medium
Vulnerability Insecure Direct Object Reference (IDOR) at Update Profile Leads to Account Takeover
Hai everyone..