hack and bug bounty
@hack_com
22
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
22 subscribers
hack and bug bounty
TryHackMe: Badbyte
Medium
TryHackMe: Badbyte
Room: https://tryhackme.com/room/badbyte
THM Rating: Easy
Actual Rating: Easy because of Walkthrough. Medium Real World
hack and bug bounty
Sliver C2 — Modern Command and Control Exploitation Framework
Medium
Sliver C2 — Modern Command and Control Exploitation Framework
Sliver is a command and control (C2) system designed for red team operations and adversarial simulation. It provides a platform for…
hack and bug bounty
Understanding the Phases of Penetration Testing (PTES)
Medium
Understanding the Phases of Penetration Testing (PTES)
Introduction
hack and bug bounty
Unmasking Directory Traversal: Navigating Vulnerabilities in Web Applications (Techniques +…
Medium
Unmasking Directory Traversal: Navigating Vulnerabilities in Web Applications (Techniques + Reports)
In web applications, inadequate input validation can lead to Directory Traversal vulnerabilities. If file operations are conducted using…
hack and bug bounty
Security implications of cross-origin resource sharing (CORS) in Node.js
Medium
Security implications of cross-origin resource sharing (CORS) in Node.js
In modern web applications, cross-origin resource sharing (CORS) enables secure communication between applications hosted on different origins. Developers use CORS to access other applications’…
hack and bug bounty
Discover Vulnerabilities with Security Testing Services
Medium
Discover Vulnerabilities with Security Testing Services
Contact QASource, today to discuss your security needs and ensure the robustness of your applications and systems.
hack and bug bounty
APPLICATION SECURITY MARKET SIZE & SHARE ANALYSIS — GROWTH TRENDS & FORECASTS (2023–2028)
Medium
APPLICATION SECURITY MARKET SIZE & SHARE ANALYSIS — GROWTH TRENDS & FORECASTS (2023–2028)
Application Security Market Analysis:
hack and bug bounty
How To Become a Bug Bounty Hunter? Essential Skills, Tools, and Ethics for Success
Medium
How To Become a Bug Bounty Hunter? Essential Skills, Tools, and Ethics for Success
Are you fascinated by the world of cybersecurity and eager to contribute to making the internet a safer place? Bug bounty hunting might be…
hack and bug bounty
CVE-2023-41954: ProfilePress <= 4.13.1 — Unauthenticated Privilege Escalation
Medium
CVE-2023-41954: ProfilePress <= 4.13.1 — Unauthenticated Privilege Escalation
Privilege Escalation vulnerability on ProfilePress Plugin. Malicious actor could register an account as Editor, Author, or other existing…
hack and bug bounty
Penetration Testing Melbourne | Aera
Medium
Penetration Testing Melbourne | Aera
Aera and our security experts provide Penetration testing; which is effectively an ethical attack, approved by you, on your business…
hack and bug bounty
VulnLab Red Team Lab-Wutai
Medium
VulnLab Red Team Lab-Wutai
A couple of months ago I discovered VulnLab, a project created by Martin Mielke. VulnLab features a pentesting & red teaming lab…
hack and bug bounty
The Importance of Regular VAPT Assessments for Strong Security Postures
Medium
The Importance of Regular VAPT Assessments for Strong Security Postures
In a world where data breaches and cyberattacks are a daily occurrence, organizations must prioritize cybersecurity to protect sensitive…
hack and bug bounty
How to Secure Windows Without Antivirus Software
Medium
How to Secure Windows Without Antivirus Software
Windows!
hack and bug bounty
MuleSoft: Setting the Gold Standard for Security in Integration
Medium
MuleSoft: Setting the Gold Standard for Security in Integration
By Maksym Dovgopolyi, CEO of SynergySoft with a Decade of Experience in API Governance
hack and bug bounty
Day 1 of My 100 Days of Cybersecurity Challenge
Medium
🔐
Day 1 of My 100 Days of Cybersecurity Challenge
🔐
Hey everyone!
hack and bug bounty
How to Accurately Locate Smartphones using Seeker
Medium
How to Accurately Locate Smartphones using Seeker
The great thing about Seeker is that other tools and services provide IP geolocation, which is NOT accurate at all and only provides an ISP location rather than the target location. Seeker works best…
hack and bug bounty
The Power of AXIOM Part 3
Medium
The Power of AXIOM Part 3
Navigating between instances
hack and bug bounty
Review: VulnLab Red Team Lab-Wutai
Medium
VulnLab Red Team Lab-Wutai
A couple of months ago I discovered VulnLab, a project created by Martin Mielke. VulnLab features a pentesting & red teaming lab…
hack and bug bounty
Hello Everyone..!!!
Medium
Hello Everyone..!!!
Welcome to my Security Research Space !!
😊
👩🏽💻
hack and bug bounty
Mastering the Art of SQL Injection: A Comprehensive Guide
Medium
Mastering the Art of SQL Injection: A Comprehensive Guide
In today’s world, data is the new currency. Every organization, whether big or small, deals with data in one way or another. But with the…