hack and bug bounty
@hack_com
22
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
22 subscribers
hack and bug bounty
The Art of Identifying X$$ & WAF Bypass Fuzzing Technique
Medium
The Art of Identifying X$$ & WAF Bypass Fuzzing Technique
A smart way to hunt Cross-Site Scripting vulnerability
hack and bug bounty
“Template Injection” A Case Study of a Successful Bug Bounty Hunt
Medium
“Template Injection” A Case Study of a Successful Bug Bounty Hunt
Introduction
hack and bug bounty
Payload-based scanning
Medium
Payload-based scanning
Introduction
hack and bug bounty
Application Flow testing
Medium
Application Flow testing
Introduction
hack and bug bounty
Input Sanitization Techniques for Secure Coding
Medium
Input Sanitization Techniques for Secure Coding
Input sanitization is an important aspect of secure coding to prevent various forms of attacks, such as SQL injection, Cross-Site Scripting…
hack and bug bounty
InfoSecSherpa’s News Roundup for Saturday, September 30, 2023
Medium
InfoSecSherpa’s News Roundup for Saturday, September 30, 2023
InfoSecSherpa: Your Guide Up a Mountain of Information!
hack and bug bounty
Password Entropy: What it is and Why it Matters…
Medium
Password Entropy: What it is and Why it Matters…
TL;DR:
hack and bug bounty
Understanding Phishing Attacks: How to Stay Safe in the Digital Age
Medium
Understanding Phishing Attacks: How to Stay Safe in the Digital Age
In the digital age, where much of our personal and financial information resides online, we face an ever-present threat known as phishing…
hack and bug bounty
Top 5 Security Resources for 2023–9–30
Medium
Top 5 Security Resources for 2023–9–30
Here are my favorite 5 security resources added to my security resource database since yesterday. These resources will range from blogs and Reddit posts, through paid resource subscriptions and…
hack and bug bounty
How companies prevent our personal data getting leaked
Medium
How companies prevent our personal data getting leaked
Preventing the leakage of personal data is a critical concern for companies in today’s digital age, given the increasing frequency and…
hack and bug bounty
The Dark Side of IPv6: Countering MITM6 Attacks
Medium
The Dark Side of IPv6: Countering MITM6 Attacks
Hey there, tech-savvy ByteBusters!
hack and bug bounty
Impostor Syndrome Struggle: Casting Off the Mask
Medium
Impostor Syndrome Struggle: Casting Off the Mask
The Struggle Is Real:
hack and bug bounty
Asked ChatGPT To Create a Cybersecurity Roadmap And here is the 25 pointer response
Medium
Asked ChatGPT To Create a Cybersecurity Roadmap And here is the 25 pointer response
Creating a cybersecurity roadmap is a strategic plan to protect your organization’s digital assets. Here’s a simplified guide:
hack and bug bounty
You can add extra zeroes. XSS bypass on a private bug bounty program
Medium
You can add extra zeroes. XSS bypass on a private bug bounty program
Hi incredible hackers. I got a private invite, and got curious about the program, so I signed up into the main website and started clicking…
hack and bug bounty
API Security — Overview
Medium
API Security — Overview
API security is vital to ensuring that your apps and backend services are not compromised.
hack and bug bounty
Goodbye Twitter, err “X.” An Open Letter to My Followers
Medium
Goodbye Twitter, err “X.” An Open Letter to My Followers
“Over the past ten years, this platform has been my canvas, where I’ve painted my thoughts freely. It’s been an incredible journey, growing…
hack and bug bounty
Read online Soldier X by Don L. Wulffson
Medium
Read online Soldier X by Don L. Wulffson
Review Soldier X by Don L Wulffson
hack and bug bounty
IDOR and Mass Assignment attacks leads to Full Account Takeover of Internal Employees
Medium
IDOR and Mass Assignment attacks leads to Full Account Takeover of Internal Employees
Hi everyone, I hope you are doing well. It’s been a while since I last published an article about my findings. In this article, I will…
hack and bug bounty
API Security Program Metrics
Medium
API Security Program Metrics
Several metrics are important to an API security program, including:
hack and bug bounty
API Güvenliği için SSL Pinning Yeterli Mi?
Medium
API Güvenliği için SSL Pinning Yeterli Mi?
Mobile uygulamalar bazında API güvenliğini sağlamak için kullanılan SSL ve SSL Pinning aşılması zor bir güvenlik sağlıyor mu?