hack and bug bounty
@hack_com
22
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
22 subscribers
hack and bug bounty
Mastering Buffer Overflow Vulnerability Pentesting: A Comprehensive Guide
Medium
Mastering Buffer Overflow Vulnerability Pentesting: A Comprehensive Guide
Buffer overflow vulnerabilities have long been a significant concern in cybersecurity. They occur when a program writes more data into a…
hack and bug bounty
Cracking the Code: Your Roadmap to Penetration Testing Success
Medium
Cracking the Code: Your Roadmap to Penetration Testing Success
Introduction
hack and bug bounty
Mastering Penetration Testing Enumeration: Unveiling Common Protocols
Medium
Mastering Penetration Testing Enumeration: Unveiling Common Protocols
Introduction
hack and bug bounty
6.2 Lab: Information disclosure on debug page | 2023
Medium
6.2 Lab: Information disclosure on debug page | 2023
This lab contains a debug page that discloses sensitive information about the application. To solve the lab, obtain and submit the…
hack and bug bounty
From Zero to Hero: The Inspirational Journey of Elon Musk
Medium
From Zero to Hero: The Inspirational Journey of Elon Musk
In the world of technology and innovation, few names shine as brightly as Elon Musk’s. His journey from a relatively unknown entrepreneur…
hack and bug bounty
Introduction & How to use vulnshot.com
Medium
Introduction & How to use vulnshot.com
🪲
If you need to manage the Nuclei CLI output which was previously only limited to chat lines on Telegram, Discord, and others, with VulnShot…
hack and bug bounty
Security Metrics and KPIs an untold story..
Medium
Security Metrics and KPIs an untold story..
To ensure the safety of your organization’s digital assets, you must be able to measure the effectiveness of your security operations and…
hack and bug bounty
Decrypting the Blockchain: Block Explorers and Transactions Analysis
Medium
Decrypting the Blockchain: Block Explorers and Transactions Analysis
Handy directory of multiple web-based tools to analyze different blockchain networks
hack and bug bounty
What is Footprinting?
Medium
What is Footprinting?
Imagine you’re a digital detective, Sherlock Holmes of the internet, trying to piece together clues to solve a mystery. That’s essentially…
hack and bug bounty
Crossing Boundaries: A Deep Dive into Cross-Origin Attacks and Their Prevention
Medium
Crossing Boundaries: A Deep Dive into Cross-Origin Attacks and Their Prevention
Hello Smart hackers, Welcome back to my new blog, I hope you all are well!! In this blog, we are going to discuss Cross-Origin Attacks and…
hack and bug bounty
Top Cyber Security Podcast You Should Listen Now
Medium
Top Cyber Security Podcast You Should Listen Now
If you are travelling or you can some free time then you can listen to this amazing cyber security podcast to expand you discovery in…
hack and bug bounty
TOP 10 PROGRAMMING LANGUAGES EVERY ETHICAL HACKER SHOULD LEARN
Medium
TOP 10 PROGRAMMING LANGUAGES EVERY ETHICAL HACKER SHOULD LEARN
Python is often the first choice for ethical hackers due to its simplicity and versatility. It offers numerous libraries and frameworks, such as Scapy for packet manipulation and PyCrypto for…
hack and bug bounty
Pentest Checklist: Preparing for a Penetration Test
Medium
Pentest Checklist: Preparing for a Penetration Test
Preparing for a penetration test can be stressful to say the least.
hack and bug bounty
Benefits of Penetration Testing
Medium
Benefits of Penetration Testing
In the dynamic landscape of the digital era, cyber threats are a constant concern. As organizations are continuously on the lookout for…
hack and bug bounty
ISO 27001 Certificate
Medium
ISO 27001 Certificate
Elevate Your Information Security Standards with ISO 27001 Certification: In an era where information is at the core of every business…
hack and bug bounty
Disclose the commerce creation ad permissions of creator’s (ig_user)
Medium
Disclose the commerce creation ad permissions of creator’s (ig_user)
This bug was accidently found while playing with the facebook graph api that allows anyone with first party access token to view the creators (ig_user) and their commerce creation ad permissions on…
hack and bug bounty
Server-side request forgery (SSRF)
Medium
Server-side request forgery (SSRF)
In this section, we’ll explain what server-side request forgery is, describe some common examples, and explain how to find and exploit…
hack and bug bounty
Easy way to find XSS bugs
Medium
Easy way to find XSS bugs
Hi Folks
hack and bug bounty
The Power of AXIOM Part 2
Medium
The Power of AXIOM Part 2
Headstart for your Bug Bounty Recon
hack and bug bounty
Unleash Your Inner Hacker and Win Big: How to Get Free Laptop and Skills from TryHackMe!
Medium
Unleash Your Inner Hacker and Win Big: How to Get Free Laptop and Skills from TryHackMe!
Exciting news, cyber warriors! TryHackMe has just unleashed a brand-new learning path for aspiring Security Engineers. Prepare to embark on…