hack and bug bounty
@hack_com
22
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
22 subscribers
hack and bug bounty
The Importance of Regular VAPT Assessments for Strong Security Postures
Medium
The Importance of Regular VAPT Assessments for Strong Security Postures
In a world where data breaches and cyberattacks are a daily occurrence, organizations must prioritize cybersecurity to protect sensitive…
hack and bug bounty
How to Secure Windows Without Antivirus Software
Medium
How to Secure Windows Without Antivirus Software
Windows!
hack and bug bounty
MuleSoft: Setting the Gold Standard for Security in Integration
Medium
MuleSoft: Setting the Gold Standard for Security in Integration
By Maksym Dovgopolyi, CEO of SynergySoft with a Decade of Experience in API Governance
hack and bug bounty
Day 1 of My 100 Days of Cybersecurity Challenge
Medium
🔐
Day 1 of My 100 Days of Cybersecurity Challenge
🔐
Hey everyone!
hack and bug bounty
How to Accurately Locate Smartphones using Seeker
Medium
How to Accurately Locate Smartphones using Seeker
The great thing about Seeker is that other tools and services provide IP geolocation, which is NOT accurate at all and only provides an ISP location rather than the target location. Seeker works best…
hack and bug bounty
The Power of AXIOM Part 3
Medium
The Power of AXIOM Part 3
Navigating between instances
hack and bug bounty
Review: VulnLab Red Team Lab-Wutai
Medium
VulnLab Red Team Lab-Wutai
A couple of months ago I discovered VulnLab, a project created by Martin Mielke. VulnLab features a pentesting & red teaming lab…
hack and bug bounty
Hello Everyone..!!!
Medium
Hello Everyone..!!!
Welcome to my Security Research Space !!
😊
👩🏽💻
hack and bug bounty
Mastering the Art of SQL Injection: A Comprehensive Guide
Medium
Mastering the Art of SQL Injection: A Comprehensive Guide
In today’s world, data is the new currency. Every organization, whether big or small, deals with data in one way or another. But with the…
hack and bug bounty
JD1’s NFC Exploit Explained
Medium
JD1’s NFC Exploit Explained
A Pretty useless exploit
hack and bug bounty
Part 4: Connecting and Using the postgresql Database with Metasploit
Medium
Part 4: Connecting and Using the postgresql Database with Metasploit
Hello Gladiators….,,,,
hack and bug bounty
Top 5 open-source bug reporting tools for web developers
Medium
Top 5 open-source bug reporting tools for web developers
An effective bug reporting system is crucial to ensuring that bugs are swiftly addressed and resolved.
hack and bug bounty
The Role of Bug Reporting in Software Testing: A Deep Dive
Medium
The Role of Bug Reporting in Software Testing: A Deep Dive
Bug reporting is crucial for software development & QA, helping to identify issues, improve quality, & enhance user satisfaction.
hack and bug bounty
Cyber Briefing: 2023.09.14
Medium
Cyber Briefing: 2023.09.14
👉
What’s going on in the cyber world today? 3AM Ransomware, Teams, Phishing, Microsoft, Kubernetes Clusters, Azure Vulnerabilities…
hack and bug bounty
PG Play — SunsetMidnight | 84/100
Medium
PG Play — SunsetMidnight | 84/100
Hi! Back today with another CTF writeup, this time featuring SunsetMidnight from Proving Grounds Play / VulnHub. This Intermediate rated…
hack and bug bounty
Building RESTful APIs with PHP
Medium
Building RESTful APIs with PHP
In an increasingly interconnected world, RESTful APIs serve as the glue that binds different services and applications together. PHP, a…
hack and bug bounty
Day 14 — Linux Fundamentals Deeper Dive: User, Package, Services, and Tasks
Medium
Day 14 — Linux Fundamentals Deeper Dive: User, Package, Services, and Tasks
Date: 14th September 2023
hack and bug bounty
NoSQL Unveiled: Vulnerabilities & Injection
Medium
NoSQL Unveiled: Vulnerabilities & Injection
Introduction:
hack and bug bounty
Scope of Cyber Security in India
Medium
Scope of Cyber Security in India
Cyber means the formation of computer networks or virtual reality and Security means to protect something. So, combining this gives us…
hack and bug bounty
Is a College Diploma in Computer Studies Worth It? A Tale from a Cyber Security Pro!
Medium
Is a College Diploma in Computer Studies Worth It? A Tale from a Cyber Security Pro!
When you start measuring the colossal cost and the effort to earn a college diploma in computer studies, is there a better way?