hack and bug bounty
@hack_com
22
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
22 subscribers
hack and bug bounty
Canvas of Intrigue: A `Refreshing` Approach to Session Token Exfiltration with XSS
Medium
Canvas of Intrigue: A `Refreshing` Approach to Session Token Exfiltration with XSS
A story of infiltration transcending security layers with a novel approach
hack and bug bounty
Dodge the ITIL Traps: Mistakes & Misadventures in IT Service Management!
Medium
Dodge the ITIL Traps: Mistakes & Misadventures in IT Service Management!
We've all had those days – you assemble a piece of IKEA furniture, only to find a screw missing. Or you bake a cake and realize you forgot the sugar. Implementing ITIL in IT can feel the same way…
hack and bug bounty
Exploiting Keepass
Medium
Exploiting Keepass
In an era where cybersecurity threats are increasingly sophisticated, the importance of secure password management cannot be overstated…
hack and bug bounty
10.2 Lab: Basic SSRF against another back-end system | 2023
Medium
10.2 Lab: Basic SSRF against another back-end system | 2023
This lab has a stock check feature that fetches data from the internal system. Use the stock check functionality to scan the internal…
hack and bug bounty
Decrypting Requests, Manipulating Responses to Gaining Super Admin Access
Medium
Decrypting Requests, Manipulating Responses to Gaining Super Admin Access
Summary:
hack and bug bounty
Caldera: Revolutionizing Cybersecurity with an Unparalleled Framework
Medium
Caldera: Revolutionizing Cybersecurity with an Unparalleled Framework
Welcome to our YouTube video on “Unveiling Caldera: Empowering Cybersecurity with a Potent Framework”! In this informative video, we delve…
hack and bug bounty
NucleiFuzzer: Automating XSS Detection for Unrivaled Security
Medium
NucleiFuzzer: Automating XSS Detection for Unrivaled Security
In this video, we introduce NucleiFuzzer, an exceptionally powerful automation tool designed specifically for detecting cross-site…
hack and bug bounty
The Art of Identifying X$$ & WAF Bypass Fuzzing Technique
Medium
The Art of Identifying X$$ & WAF Bypass Fuzzing Technique
A smart way to hunt Cross-Site Scripting vulnerability
hack and bug bounty
“Template Injection” A Case Study of a Successful Bug Bounty Hunt
Medium
“Template Injection” A Case Study of a Successful Bug Bounty Hunt
Introduction
hack and bug bounty
Payload-based scanning
Medium
Payload-based scanning
Introduction
hack and bug bounty
Application Flow testing
Medium
Application Flow testing
Introduction
hack and bug bounty
Input Sanitization Techniques for Secure Coding
Medium
Input Sanitization Techniques for Secure Coding
Input sanitization is an important aspect of secure coding to prevent various forms of attacks, such as SQL injection, Cross-Site Scripting…
hack and bug bounty
InfoSecSherpa’s News Roundup for Saturday, September 30, 2023
Medium
InfoSecSherpa’s News Roundup for Saturday, September 30, 2023
InfoSecSherpa: Your Guide Up a Mountain of Information!
hack and bug bounty
Password Entropy: What it is and Why it Matters…
Medium
Password Entropy: What it is and Why it Matters…
TL;DR:
hack and bug bounty
Understanding Phishing Attacks: How to Stay Safe in the Digital Age
Medium
Understanding Phishing Attacks: How to Stay Safe in the Digital Age
In the digital age, where much of our personal and financial information resides online, we face an ever-present threat known as phishing…
hack and bug bounty
Top 5 Security Resources for 2023–9–30
Medium
Top 5 Security Resources for 2023–9–30
Here are my favorite 5 security resources added to my security resource database since yesterday. These resources will range from blogs and Reddit posts, through paid resource subscriptions and…
hack and bug bounty
How companies prevent our personal data getting leaked
Medium
How companies prevent our personal data getting leaked
Preventing the leakage of personal data is a critical concern for companies in today’s digital age, given the increasing frequency and…
hack and bug bounty
The Dark Side of IPv6: Countering MITM6 Attacks
Medium
The Dark Side of IPv6: Countering MITM6 Attacks
Hey there, tech-savvy ByteBusters!
hack and bug bounty
Impostor Syndrome Struggle: Casting Off the Mask
Medium
Impostor Syndrome Struggle: Casting Off the Mask
The Struggle Is Real:
hack and bug bounty
Asked ChatGPT To Create a Cybersecurity Roadmap And here is the 25 pointer response
Medium
Asked ChatGPT To Create a Cybersecurity Roadmap And here is the 25 pointer response
Creating a cybersecurity roadmap is a strategic plan to protect your organization’s digital assets. Here’s a simplified guide: