hack and bug bounty
@hack_com
22
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
22 subscribers
hack and bug bounty
PG Play — SunsetMidnight | 84/100
Medium
PG Play — SunsetMidnight | 84/100
Hi! Back today with another CTF writeup, this time featuring SunsetMidnight from Proving Grounds Play / VulnHub. This Intermediate rated…
hack and bug bounty
Building RESTful APIs with PHP
Medium
Building RESTful APIs with PHP
In an increasingly interconnected world, RESTful APIs serve as the glue that binds different services and applications together. PHP, a…
hack and bug bounty
Day 14 — Linux Fundamentals Deeper Dive: User, Package, Services, and Tasks
Medium
Day 14 — Linux Fundamentals Deeper Dive: User, Package, Services, and Tasks
Date: 14th September 2023
hack and bug bounty
NoSQL Unveiled: Vulnerabilities & Injection
Medium
NoSQL Unveiled: Vulnerabilities & Injection
Introduction:
hack and bug bounty
Scope of Cyber Security in India
Medium
Scope of Cyber Security in India
Cyber means the formation of computer networks or virtual reality and Security means to protect something. So, combining this gives us…
hack and bug bounty
Is a College Diploma in Computer Studies Worth It? A Tale from a Cyber Security Pro!
Medium
Is a College Diploma in Computer Studies Worth It? A Tale from a Cyber Security Pro!
When you start measuring the colossal cost and the effort to earn a college diploma in computer studies, is there a better way?
hack and bug bounty
6.4 Lab: Authentication bypass via information disclosure | 2023
Medium
6.4 Lab: Authentication bypass via information disclosure | 2023
To solve the lab, obtain the header name then use it to access the admin interface and delete the user carlos | Karthikeyan Nagaraj
hack and bug bounty
Basics of Same-Origin Policy | by Azad
Medium
Basics of Same-Origin Policy | by Azad
The same-origin policy is a security mechanism that restricts how a javascript of one origin interact with a resource from another origin.
hack and bug bounty
Mobile Device Security: Safeguarding Your Digital World in the Age of BYOD
Medium
Mobile Device Security: Safeguarding Your Digital World in the Age of BYOD
In today’s digitally connected world, mobile devices have become indispensable tools for work and play. With the rise of Bring Your Own…
hack and bug bounty
Race Condition Vulnerabilities: A Hands-On Primer — Part 1
Medium
Race Condition Vulnerabilities: A Hands-On Primer — Part 1
Hi Everyone My name is Hashar Mujahid. I am a cyber security student and full-time freelancer. Today we will look at a topic that is…
hack and bug bounty
Critical Security Flaws in Kubernetes: Understanding CVE-2023–3676, CVE-2023–3893, and…
Medium
Critical Security Flaws in Kubernetes: Understanding CVE-2023–3676, CVE-2023–3893, and…
Introduction
hack and bug bounty
Web Intelligence Researching Domains
Medium
Web Intelligence Researching Domains
Web intelligence (WEBINT) is a means to efficiently identify the intelligence available in open source (OSINT). Structuring and visualizing…
hack and bug bounty
How to find subdomain takeover using httpx + dig
Medium
How to find subdomain takeover using httpx + dig
Hello Everyone
hack and bug bounty
A Journey into Bug Bounty Hunting: Perseverance Pays Off
Medium
A Journey into Bug Bounty Hunting: Perseverance Pays Off
Assalamualaikum everyone,
hack and bug bounty
Bug Bounty — It’s Not a Treasure Hunt, But It’s Still a Blast!
Medium
Bug Bounty — It’s Not a Treasure Hunt, But It’s Still a Blast!
Today, as we continue on our cyber adventure, let’s pause for a moment and what Bug Bounty is and, more importantly, what it isn’t.
hack and bug bounty
Remediate Web3: R.xyz
Medium
Remediate Web3: R.xyz
So, what are the chances of enhancing current techniques with additional security, and how precisely is the security of the protocol formed…
hack and bug bounty
DOM Invader and the case of direct eval vs indirect eval
PortSwigger Blog
DOM Invader and the case of direct eval vs indirect eval
What is DOM Invader? DOM Invader is a browser extension that makes it easy to find DOM based XSS by instrumenting various JavaScript functions. You can find out more about DOM Invader here: Introducin
hack and bug bounty
Managing AXIOM instances
Medium
Managing AXIOM instances
Connecting, executing commands, file transferring and snapshoting in AXIOM
hack and bug bounty
Core Functionality of AXIOM
Medium
Core Functionality of AXIOM
Headstart for your Bug Bounty Recon
hack and bug bounty
The Introduction to AXIOM
Medium
The Introduction to AXIOM
Distributed Attack Orchestration