hack and bug bounty
@hack_com
22
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
22 subscribers
hack and bug bounty
A Journey into Bug Bounty Hunting: Perseverance Pays Off
Medium
A Journey into Bug Bounty Hunting: Perseverance Pays Off
Assalamualaikum everyone,
hack and bug bounty
Bug Bounty — It’s Not a Treasure Hunt, But It’s Still a Blast!
Medium
Bug Bounty — It’s Not a Treasure Hunt, But It’s Still a Blast!
Today, as we continue on our cyber adventure, let’s pause for a moment and what Bug Bounty is and, more importantly, what it isn’t.
hack and bug bounty
Remediate Web3: R.xyz
Medium
Remediate Web3: R.xyz
So, what are the chances of enhancing current techniques with additional security, and how precisely is the security of the protocol formed…
hack and bug bounty
DOM Invader and the case of direct eval vs indirect eval
PortSwigger Blog
DOM Invader and the case of direct eval vs indirect eval
What is DOM Invader? DOM Invader is a browser extension that makes it easy to find DOM based XSS by instrumenting various JavaScript functions. You can find out more about DOM Invader here: Introducin
hack and bug bounty
Managing AXIOM instances
Medium
Managing AXIOM instances
Connecting, executing commands, file transferring and snapshoting in AXIOM
hack and bug bounty
Core Functionality of AXIOM
Medium
Core Functionality of AXIOM
Headstart for your Bug Bounty Recon
hack and bug bounty
The Introduction to AXIOM
Medium
The Introduction to AXIOM
Distributed Attack Orchestration
hack and bug bounty
Reverse Search IDOR approach to Exposure of all Organizational Sensitive Information.
Medium
Reverse Search IDOR approach to Exposure of all Organizational Sensitive Information.
IDORs Everywhere.
hack and bug bounty
22.6k+ GitHub Stars Note-Taking App Hit by XSS Vulnerability
Medium
22.6k+ GitHub Stars Note-Taking App Hit by XSS Vulnerability
CVE-2023–3067: Stored Cross Site Scripting Vulnerability on renowned note-taking thick client app Trillium
hack and bug bounty
Find Bugs While Sleeping ? Get Phone Notifications When A Bug Is Found
Medium
Find Bugs While Sleeping ? Get Phone Notifications When A Bug Is Found
Hello Everyone!
hack and bug bounty
A Practical Approach to SBOM in CI/CD Part II — Deploying Dependency-Track
Medium
A Practical Approach to SBOM in CI/CD Part II — Deploying Dependency-Track
The article presents how to store and analyse Software Bill of Materials with OWASP Dependency-Track to identify security vulnerabilities…
hack and bug bounty
Threat modeling Handbook #4: How to get better at Threat modeling
Medium
Threat modeling Handbook #4: How to get better at Threat modeling
I know the previous story of this series (links to all previous stories below) was a bit long and may have been a little overwhelming…
hack and bug bounty
Exploring the World of Cybersecurity Domains
Medium
Exploring the World of Cybersecurity Domains
In today’s digital age, cybersecurity is paramount. As technology advances, so do the threats that can compromise our online security. To…
hack and bug bounty
Market Share Insights: Dominant Players in the Web Application Firewall Arena
Medium
Market Share Insights: Dominant Players in the Web Application Firewall Arena
A Web Application Firewall (WAF) serves as a protective shield for web assets and customers against web-based attacks and malicious…
hack and bug bounty
Introduction to Fortify Software Security Center: A Comprehensive Guide
Medium
Introduction to Fortify Software Security Center: A Comprehensive Guide
hack and bug bounty
Mobile App Security: A Deep Dive into Resilience & Credential Management
Medium
Mobile App Security: A Deep Dive into Resilience & Credential Management
In this article we talk about how to build resilient Mobile Applications and how to securely manage User Credentials within them
hack and bug bounty
Secure Development: Shift-left with SAST
Medium
Secure Development: Shift-left with SAST
Secure development is a set of practices which integrates security in the early stage of development and across each phase of the…
hack and bug bounty
DevOps 2023: Make your Applications more secure using the Fuzzy Testing technique
Medium
DevOps 2023: Make your Applications more secure using the Fuzzy Testing technique
Understanding Fuzzing in 2023 to make your Applications more secure
hack and bug bounty
Extracting Sensitive Data from HTML and JS Files.
Medium
Extracting Sensitive Data from HTML and JS Files.
Hello Friends,
I hope you have a good day and enjoy reading :”)
hack and bug bounty
ProductSec Increases Developer Velocity
Medium
ProductSec Increases Developer Velocity
In the fast-paced world of software development, speed and efficiency are key. A Software as a Service (SaaS) product security platform…