hack and bug bounty
@hack_com
22
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
22 subscribers
hack and bug bounty
Mastering the Art of SQL Injection: A Comprehensive Guide
Medium
Mastering the Art of SQL Injection: A Comprehensive Guide
In today’s world, data is the new currency. Every organization, whether big or small, deals with data in one way or another. But with the…
hack and bug bounty
JD1’s NFC Exploit Explained
Medium
JD1’s NFC Exploit Explained
A Pretty useless exploit
hack and bug bounty
Part 4: Connecting and Using the postgresql Database with Metasploit
Medium
Part 4: Connecting and Using the postgresql Database with Metasploit
Hello Gladiators….,,,,
hack and bug bounty
Top 5 open-source bug reporting tools for web developers
Medium
Top 5 open-source bug reporting tools for web developers
An effective bug reporting system is crucial to ensuring that bugs are swiftly addressed and resolved.
hack and bug bounty
The Role of Bug Reporting in Software Testing: A Deep Dive
Medium
The Role of Bug Reporting in Software Testing: A Deep Dive
Bug reporting is crucial for software development & QA, helping to identify issues, improve quality, & enhance user satisfaction.
hack and bug bounty
Cyber Briefing: 2023.09.14
Medium
Cyber Briefing: 2023.09.14
👉
What’s going on in the cyber world today? 3AM Ransomware, Teams, Phishing, Microsoft, Kubernetes Clusters, Azure Vulnerabilities…
hack and bug bounty
PG Play — SunsetMidnight | 84/100
Medium
PG Play — SunsetMidnight | 84/100
Hi! Back today with another CTF writeup, this time featuring SunsetMidnight from Proving Grounds Play / VulnHub. This Intermediate rated…
hack and bug bounty
Building RESTful APIs with PHP
Medium
Building RESTful APIs with PHP
In an increasingly interconnected world, RESTful APIs serve as the glue that binds different services and applications together. PHP, a…
hack and bug bounty
Day 14 — Linux Fundamentals Deeper Dive: User, Package, Services, and Tasks
Medium
Day 14 — Linux Fundamentals Deeper Dive: User, Package, Services, and Tasks
Date: 14th September 2023
hack and bug bounty
NoSQL Unveiled: Vulnerabilities & Injection
Medium
NoSQL Unveiled: Vulnerabilities & Injection
Introduction:
hack and bug bounty
Scope of Cyber Security in India
Medium
Scope of Cyber Security in India
Cyber means the formation of computer networks or virtual reality and Security means to protect something. So, combining this gives us…
hack and bug bounty
Is a College Diploma in Computer Studies Worth It? A Tale from a Cyber Security Pro!
Medium
Is a College Diploma in Computer Studies Worth It? A Tale from a Cyber Security Pro!
When you start measuring the colossal cost and the effort to earn a college diploma in computer studies, is there a better way?
hack and bug bounty
6.4 Lab: Authentication bypass via information disclosure | 2023
Medium
6.4 Lab: Authentication bypass via information disclosure | 2023
To solve the lab, obtain the header name then use it to access the admin interface and delete the user carlos | Karthikeyan Nagaraj
hack and bug bounty
Basics of Same-Origin Policy | by Azad
Medium
Basics of Same-Origin Policy | by Azad
The same-origin policy is a security mechanism that restricts how a javascript of one origin interact with a resource from another origin.
hack and bug bounty
Mobile Device Security: Safeguarding Your Digital World in the Age of BYOD
Medium
Mobile Device Security: Safeguarding Your Digital World in the Age of BYOD
In today’s digitally connected world, mobile devices have become indispensable tools for work and play. With the rise of Bring Your Own…
hack and bug bounty
Race Condition Vulnerabilities: A Hands-On Primer — Part 1
Medium
Race Condition Vulnerabilities: A Hands-On Primer — Part 1
Hi Everyone My name is Hashar Mujahid. I am a cyber security student and full-time freelancer. Today we will look at a topic that is…
hack and bug bounty
Critical Security Flaws in Kubernetes: Understanding CVE-2023–3676, CVE-2023–3893, and…
Medium
Critical Security Flaws in Kubernetes: Understanding CVE-2023–3676, CVE-2023–3893, and…
Introduction
hack and bug bounty
Web Intelligence Researching Domains
Medium
Web Intelligence Researching Domains
Web intelligence (WEBINT) is a means to efficiently identify the intelligence available in open source (OSINT). Structuring and visualizing…
hack and bug bounty
How to find subdomain takeover using httpx + dig
Medium
How to find subdomain takeover using httpx + dig
Hello Everyone
hack and bug bounty
A Journey into Bug Bounty Hunting: Perseverance Pays Off
Medium
A Journey into Bug Bounty Hunting: Perseverance Pays Off
Assalamualaikum everyone,