hack and bug bounty
@hack_com
22
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
22 subscribers
hack and bug bounty
Unleash the Power of Workflow: Unleash Your Creativity in Open Site Discovery
Medium
Unleash the Power of Workflow: Unleash Your Creativity in Open Site Discovery
Unleash your creativity in open site discovery by the workflow.
hack and bug bounty
How to Independently Refresh Your Assets on FOFA?
Medium
How to Independently Refresh Your Assets on FOFA?
hack and bug bounty
Intelligent Data Station——FOFAHub
Medium
Intelligent Data Station——FOFAHub
Intelligent data station — FOFAHub
hack and bug bounty
Command-Line Walk-Through: Unveiling the Power of Linux and Kali (Part 1 of 2)
Medium
Command-Line Walk-Through: Unveiling the Power of Linux and Kali (Part 1 of 2)
In the realm of cybersecurity, a strong foundation serves as our compass through the intricate digital landscape. Navigating through the…
hack and bug bounty
Android Penetration Testing: A Deep Dive
Medium
Android Penetration Testing: A Deep Dive
In an era where mobile devices are omnipresent, ensuring the security of mobile applications, especially Android apps, is paramount. Enter…
hack and bug bounty
OWASP Top 10: 1. Broken Access Control — Journey of web application pentesting.
Medium
OWASP Top 10: 1. Broken Access Control — Journey of web application pentesting.
Broken Access Control — Overview:
hack and bug bounty
Revealing the Intriguing HTTP Response Splitting Vulnerability | Bounty $200
Medium
Revealing the Intriguing HTTP Response Splitting Vulnerability | Bounty $200
Hey there, I’m Umair Farooqui, and I’m thrilled to take you on a journey through a fascinating discovery I made in the ever-evolving realm…
hack and bug bounty
Binary-To-Source Validation And Keeping Up With An Undetectable Threat
Medium
Binary-To-Source Validation And Keeping Up With An Undetectable Threat
Intro
hack and bug bounty
Chaining low impact bugs leads to 0 click Mass ATO
Medium
Chaining low impact bugs leads to 0 click Mass ATO
Hello everyone, I hope you’re doing well. This is my first writeup so if you don’t understand something, please let me know in order to fix it or improve it. Today, i want to share with you an…
hack and bug bounty
Cozy Hosting HackTheBox Write-Up
Medium
Cozy Hosting HackTheBox Write-Up
hack and bug bounty
Cyber Briefing: 2023.09.06
Medium
Cyber Briefing: 2023.09.06
👉
What’s trending in cybersecurity today? Chaes Malware, Phyton, ASUS Routers Vulnerabilities, W3LL, Phishing Tool Kit, SEL, CISA ICSs…
hack and bug bounty
5.2 Lab: High-level logic vulnerability | 2023
Medium
5.2 Lab: High-level logic vulnerability | 2023
To solve the lab, buy a “Lightweight l33t leather jacket”. You can log in to your own account using the following credentials: wiener:peter…
hack and bug bounty
PG Play — Moneybox | 73/100
Medium
PG Play — Moneybox | 73/100
Howdy! I’m back at it today working on Moneybox from Proving Grounds Play / VulnHub. This was an Easy rated machine that was really…
hack and bug bounty
The Art of Brute force with Facebook (Oculus) White-Hat Security Team
Medium
The Art of Brute force with Facebook (Oculus) White-Hat Security Team
Brute force involves an attacker trying every possible combination of usernames, passwords, or encryption keys until the right one is…
hack and bug bounty
How I made a mundane bug into something impactful
Medium
How I made a mundane bug into something impactful
Hello again, today I will be going over another bug that I have found and reported. The company will remain redacted however the process…
hack and bug bounty
An Intro to Authentication Vulnerabilities — With Examples
Medium
An Intro to Authentication Vulnerabilities — With Examples
Authentication is the process through which the identity of the user of a system is verified. That means it is through authentication we…
hack and bug bounty
Supporting Sprocket Security's offensive security testing with BChecks, from Burp Suite
PortSwigger Blog
Supporting Sprocket Security's offensive security testing with BChecks, from Burp Suite
The US-based organization Sprocket Security provides continuous penetration testing services to customers by monitoring clients’ attack surfaces and searching for new and novel exploitation techniques
hack and bug bounty
A Crash Course in OAuth Demonstrated Proof of Possession (DPoP)
Medium
A Crash Course in OAuth Demonstrated Proof of Possession (DPoP)
Proof? You can’t handle the proof!
hack and bug bounty
Hack the box — Keeper
Medium
Hack the box — Keeper
Scanning IP: 10.1.11.127
hack and bug bounty
Application for bank manager for zero balance account
Medium
Application for bank manager for zero balance account
Bank Manager, SBI Bank, Magadi Road Branch Near Magadi Road metro station, Bengaluru- 454332