hack and bug bounty
@hack_com
22
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
22 subscribers
hack and bug bounty
PG Play — DriftingBlues6 | 72/100
Medium
PG Play — DriftingBlues6 | 72/100
Hi! Today I’m working on DriftingBlues6 from Proving Grounds Play / VulnHub. This box featured discovering a zip file and cracking it’s…
hack and bug bounty
how to build a fully functional RESTful API using C# and ASP.NET Core.
Medium
how to build a fully functional RESTful API using C# and ASP.NET Core.
💻
👋
Hello there! Welcome to my programming guide on how to create a simple .NET REST API application!
🚀
In this guide, we will take a deep…
hack and bug bounty
Penetration Testing Lab: PAM Authentication
Medium
Penetration Testing Lab: PAM Authentication
If you teach Cyber or are interested in the field of penetration testing, here’s a lab you can use with your students or work through on…
hack and bug bounty
Demystifying the Difference Between Pentesting and Ethical Hacking
Medium
Demystifying the Difference Between Pentesting and Ethical Hacking
In the realm of cybersecurity, the terms “pentesting” and “ethical hacking” are often used interchangeably, leading to some confusion among…
hack and bug bounty
Musk On Mission To Buy Catholic Church
Medium
Musk On Mission To Buy Catholic Church
Mogul said to be seeking more followers
hack and bug bounty
How to strongly secure public APIs using HMAC
Medium
How to strongly secure public APIs using HMAC
There is no general authentication method for all types of API. It depends on the API purpose. The API might provide sensitive services…
hack and bug bounty
X-algo
Medium
X-algo
As we speak, X’s hidden algorithmic quirks are being unravelled by the community, and finally brought to daylight. It’s tragicomically…
hack and bug bounty
A Comprehensive approach for testing for SQL Injection Vulnerabilities
Medium
A Comprehensive Approach for Testing for SQL Injection Vulnerabilities
TL;DR
hack and bug bounty
The Ultimate Guide to Bug Bounty Hunting: Learn How to Find and Report Vulnerabilities
Medium
The Ultimate Guide to Bug Bounty Hunting: Learn How to Find and Report Vulnerabilities
Learn How to Find and Report Vulnerabilities in 2023
hack and bug bounty
For Newbies: Simple Examples of LDAP Injection Vulnerabilities
Medium
What is LDAP?
What is LDAP?
hack and bug bounty
Hacking a Windows Machine by Hiding a RAT Inside the File
Medium
Hacking a Windows Machine by Hiding a RAT Inside the File
In this article, I will show you how to hack Windows computers using a Remote Administration Tool (RAT) called Koadic.
hack and bug bounty
Exploring Narrowlink: Your Swiss Army Knife for Secure Networking
Medium
Exploring Narrowlink: Your Swiss Army Knife for Secure Networking
Hey there, tech enthusiasts! Today, we’re diving into the fascinating world of Narrowlink — a nifty tool that’s like a multi-purpose tool…
hack and bug bounty
Enhancing Bug Bounty Workflow with Advanced Google Dorks
Medium
Enhancing Bug Bounty Workflow with Advanced Google Dorks
Bug bounty hunting has become an essential part of cybersecurity, allowing skilled individuals to identify vulnerabilities in web…
hack and bug bounty
Story of Stored Blind XSS
Medium
Story of Stored Blind XSS
Cross Site Scripting
hack and bug bounty
Again? Subdomain takeover via ideanote.io
Medium
Again? Subdomain takeover via ideanote.io
Exploiting subdomain takeover Ideanote, Ideanote is a new way to work with ideas. It’s faster, more efficient, and lets you build a fully…
hack and bug bounty
The Difference Between Pentesting and Ethical Hacking
Medium
The Difference Between Pentesting and Ethical Hacking
In today’s interconnected digital world, security is paramount. With cyber threats on the rise, organisations and individuals are…
hack and bug bounty
What is a database vulnerability? What is a database attack?
Medium
What is a database vulnerability? What is a database attack?
A database vulnerability refers to a weakness or flaw in a database management system (DBMS) that could be exploited by malicious actors or…
hack and bug bounty
Best Approach for Fetching Large Amounts of Asset in FOFA
Medium
Best Approach for Fetching Large Amounts of Asset in FOFA
Choose the FOFA data acquisition method that works best for you.
hack and bug bounty
Elevating FOFA Search Efficiency through Novel Approaches
Medium
Elevating FOFA Search Efficiency through Novel Approaches
Elevating FOFA search efficiency through novel approaches.
hack and bug bounty
Get Started with FOFA: A Beginner’s Guide
Medium
Get Started with FOFA: A Beginner’s Guide
How to become a junior FOFA engineer with search capabilities?