hack and bug bounty
@hack_com
22
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
22 subscribers
hack and bug bounty
From Zero to Hero: The Inspirational Journey of Elon Musk
Medium
From Zero to Hero: The Inspirational Journey of Elon Musk
In the world of technology and innovation, few names shine as brightly as Elon Musk’s. His journey from a relatively unknown entrepreneur…
hack and bug bounty
Introduction & How to use vulnshot.com
Medium
Introduction & How to use vulnshot.com
🪲
If you need to manage the Nuclei CLI output which was previously only limited to chat lines on Telegram, Discord, and others, with VulnShot…
hack and bug bounty
Security Metrics and KPIs an untold story..
Medium
Security Metrics and KPIs an untold story..
To ensure the safety of your organization’s digital assets, you must be able to measure the effectiveness of your security operations and…
hack and bug bounty
Decrypting the Blockchain: Block Explorers and Transactions Analysis
Medium
Decrypting the Blockchain: Block Explorers and Transactions Analysis
Handy directory of multiple web-based tools to analyze different blockchain networks
hack and bug bounty
What is Footprinting?
Medium
What is Footprinting?
Imagine you’re a digital detective, Sherlock Holmes of the internet, trying to piece together clues to solve a mystery. That’s essentially…
hack and bug bounty
Crossing Boundaries: A Deep Dive into Cross-Origin Attacks and Their Prevention
Medium
Crossing Boundaries: A Deep Dive into Cross-Origin Attacks and Their Prevention
Hello Smart hackers, Welcome back to my new blog, I hope you all are well!! In this blog, we are going to discuss Cross-Origin Attacks and…
hack and bug bounty
Top Cyber Security Podcast You Should Listen Now
Medium
Top Cyber Security Podcast You Should Listen Now
If you are travelling or you can some free time then you can listen to this amazing cyber security podcast to expand you discovery in…
hack and bug bounty
TOP 10 PROGRAMMING LANGUAGES EVERY ETHICAL HACKER SHOULD LEARN
Medium
TOP 10 PROGRAMMING LANGUAGES EVERY ETHICAL HACKER SHOULD LEARN
Python is often the first choice for ethical hackers due to its simplicity and versatility. It offers numerous libraries and frameworks, such as Scapy for packet manipulation and PyCrypto for…
hack and bug bounty
Pentest Checklist: Preparing for a Penetration Test
Medium
Pentest Checklist: Preparing for a Penetration Test
Preparing for a penetration test can be stressful to say the least.
hack and bug bounty
Benefits of Penetration Testing
Medium
Benefits of Penetration Testing
In the dynamic landscape of the digital era, cyber threats are a constant concern. As organizations are continuously on the lookout for…
hack and bug bounty
ISO 27001 Certificate
Medium
ISO 27001 Certificate
Elevate Your Information Security Standards with ISO 27001 Certification: In an era where information is at the core of every business…
hack and bug bounty
Disclose the commerce creation ad permissions of creator’s (ig_user)
Medium
Disclose the commerce creation ad permissions of creator’s (ig_user)
This bug was accidently found while playing with the facebook graph api that allows anyone with first party access token to view the creators (ig_user) and their commerce creation ad permissions on…
hack and bug bounty
Server-side request forgery (SSRF)
Medium
Server-side request forgery (SSRF)
In this section, we’ll explain what server-side request forgery is, describe some common examples, and explain how to find and exploit…
hack and bug bounty
Easy way to find XSS bugs
Medium
Easy way to find XSS bugs
Hi Folks
hack and bug bounty
The Power of AXIOM Part 2
Medium
The Power of AXIOM Part 2
Headstart for your Bug Bounty Recon
hack and bug bounty
Unleash Your Inner Hacker and Win Big: How to Get Free Laptop and Skills from TryHackMe!
Medium
Unleash Your Inner Hacker and Win Big: How to Get Free Laptop and Skills from TryHackMe!
Exciting news, cyber warriors! TryHackMe has just unleashed a brand-new learning path for aspiring Security Engineers. Prepare to embark on…
hack and bug bounty
Why do you need a Security Operations Center?
Medium
Why do you need a Security Operations Center?
Keeping in mind the increased rate of cybercrime, it is essential to appoint a robust team that can provide a set of security guidelines…
hack and bug bounty
Static Analysis Showcase
Medium
Static Analysis Showcase
Assemblyline Blog Entry #3
hack and bug bounty
Cyber Briefing: 2023.09.12
Medium
Cyber Briefing: 2023.09.12
👉
What’s the latest in the cyber world today? Google Update, Zero-Day Vulnerability, MetaStealer, Malware, macOS, Charming Kitten…
hack and bug bounty
TryHackMe’s Security Engineer Learning Path
Medium
TryHackMe’s Security Engineer Learning Path
Welcome, fellow cyber enthusiasts! In today’s digital age, where data breaches and cyberattacks have become the new norm, the demand for…