hack and bug bounty
@hack_com
22
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
22 subscribers
hack and bug bounty
Why pentesters use Gobuster?
Medium
Why pentesters use Gobuster?
Gobuster is an open-source tool commonly used in cybersecurity and penetration testing for directory and file brute-forcing or enumeration…
hack and bug bounty
Understanding CVSS: Your Essential Guide to Cybersecurity Risk Assessment
Medium
Understanding CVSS: Your Essential Guide to Cybersecurity Risk Assessment
Caution: Long Blog Ahead! Get ready for an in-depth dive into our topic :-).
hack and bug bounty
WunderGraph Cosmo: Pioneering Federated GraphQL Security and Data Sovereignty
Medium
WunderGraph Cosmo: Pioneering Federated GraphQL Security and Data Sovereignty
Explore the revolutionary features of WunderGraph Cosmo in the world of Federated GraphQL. Dive into its robust architecture, unmatched…
hack and bug bounty
TryHackMe: Badbyte
Medium
TryHackMe: Badbyte
Room: https://tryhackme.com/room/badbyte
THM Rating: Easy
Actual Rating: Easy because of Walkthrough. Medium Real World
hack and bug bounty
Sliver C2 — Modern Command and Control Exploitation Framework
Medium
Sliver C2 — Modern Command and Control Exploitation Framework
Sliver is a command and control (C2) system designed for red team operations and adversarial simulation. It provides a platform for…
hack and bug bounty
Understanding the Phases of Penetration Testing (PTES)
Medium
Understanding the Phases of Penetration Testing (PTES)
Introduction
hack and bug bounty
Unmasking Directory Traversal: Navigating Vulnerabilities in Web Applications (Techniques +…
Medium
Unmasking Directory Traversal: Navigating Vulnerabilities in Web Applications (Techniques + Reports)
In web applications, inadequate input validation can lead to Directory Traversal vulnerabilities. If file operations are conducted using…
hack and bug bounty
Security implications of cross-origin resource sharing (CORS) in Node.js
Medium
Security implications of cross-origin resource sharing (CORS) in Node.js
In modern web applications, cross-origin resource sharing (CORS) enables secure communication between applications hosted on different origins. Developers use CORS to access other applications’…
hack and bug bounty
Discover Vulnerabilities with Security Testing Services
Medium
Discover Vulnerabilities with Security Testing Services
Contact QASource, today to discuss your security needs and ensure the robustness of your applications and systems.
hack and bug bounty
APPLICATION SECURITY MARKET SIZE & SHARE ANALYSIS — GROWTH TRENDS & FORECASTS (2023–2028)
Medium
APPLICATION SECURITY MARKET SIZE & SHARE ANALYSIS — GROWTH TRENDS & FORECASTS (2023–2028)
Application Security Market Analysis:
hack and bug bounty
How To Become a Bug Bounty Hunter? Essential Skills, Tools, and Ethics for Success
Medium
How To Become a Bug Bounty Hunter? Essential Skills, Tools, and Ethics for Success
Are you fascinated by the world of cybersecurity and eager to contribute to making the internet a safer place? Bug bounty hunting might be…
hack and bug bounty
CVE-2023-41954: ProfilePress <= 4.13.1 — Unauthenticated Privilege Escalation
Medium
CVE-2023-41954: ProfilePress <= 4.13.1 — Unauthenticated Privilege Escalation
Privilege Escalation vulnerability on ProfilePress Plugin. Malicious actor could register an account as Editor, Author, or other existing…
hack and bug bounty
Penetration Testing Melbourne | Aera
Medium
Penetration Testing Melbourne | Aera
Aera and our security experts provide Penetration testing; which is effectively an ethical attack, approved by you, on your business…
hack and bug bounty
VulnLab Red Team Lab-Wutai
Medium
VulnLab Red Team Lab-Wutai
A couple of months ago I discovered VulnLab, a project created by Martin Mielke. VulnLab features a pentesting & red teaming lab…
hack and bug bounty
The Importance of Regular VAPT Assessments for Strong Security Postures
Medium
The Importance of Regular VAPT Assessments for Strong Security Postures
In a world where data breaches and cyberattacks are a daily occurrence, organizations must prioritize cybersecurity to protect sensitive…
hack and bug bounty
How to Secure Windows Without Antivirus Software
Medium
How to Secure Windows Without Antivirus Software
Windows!
hack and bug bounty
MuleSoft: Setting the Gold Standard for Security in Integration
Medium
MuleSoft: Setting the Gold Standard for Security in Integration
By Maksym Dovgopolyi, CEO of SynergySoft with a Decade of Experience in API Governance
hack and bug bounty
Day 1 of My 100 Days of Cybersecurity Challenge
Medium
🔐
Day 1 of My 100 Days of Cybersecurity Challenge
🔐
Hey everyone!
hack and bug bounty
How to Accurately Locate Smartphones using Seeker
Medium
How to Accurately Locate Smartphones using Seeker
The great thing about Seeker is that other tools and services provide IP geolocation, which is NOT accurate at all and only provides an ISP location rather than the target location. Seeker works best…
hack and bug bounty
The Power of AXIOM Part 3
Medium
The Power of AXIOM Part 3
Navigating between instances