hack and bug bounty
@hack_com
22
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
22 subscribers
hack and bug bounty
You can add extra zeroes. XSS bypass on a private bug bounty program
Medium
You can add extra zeroes. XSS bypass on a private bug bounty program
Hi incredible hackers. I got a private invite, and got curious about the program, so I signed up into the main website and started clicking…
hack and bug bounty
API Security — Overview
Medium
API Security — Overview
API security is vital to ensuring that your apps and backend services are not compromised.
hack and bug bounty
Goodbye Twitter, err “X.” An Open Letter to My Followers
Medium
Goodbye Twitter, err “X.” An Open Letter to My Followers
“Over the past ten years, this platform has been my canvas, where I’ve painted my thoughts freely. It’s been an incredible journey, growing…
hack and bug bounty
Read online Soldier X by Don L. Wulffson
Medium
Read online Soldier X by Don L. Wulffson
Review Soldier X by Don L Wulffson
hack and bug bounty
IDOR and Mass Assignment attacks leads to Full Account Takeover of Internal Employees
Medium
IDOR and Mass Assignment attacks leads to Full Account Takeover of Internal Employees
Hi everyone, I hope you are doing well. It’s been a while since I last published an article about my findings. In this article, I will…
hack and bug bounty
API Security Program Metrics
Medium
API Security Program Metrics
Several metrics are important to an API security program, including:
hack and bug bounty
API Güvenliği için SSL Pinning Yeterli Mi?
Medium
API Güvenliği için SSL Pinning Yeterli Mi?
Mobile uygulamalar bazında API güvenliğini sağlamak için kullanılan SSL ve SSL Pinning aşılması zor bir güvenlik sağlıyor mu?
hack and bug bounty
Advanced Penetration Testing Course in Delhi
Medium
Advanced Penetration Testing Course in Delhi
Penetration testing is an essential skill in the world of cybersecurity. It allows security professionals to simulate cyber-attacks on…
hack and bug bounty
what is an application security engineer?
Medium
what is an application security engineer?
If you are interested in becoming an application security engineer, you can start by earning a bachelor’s degree in cybersecurity and…
hack and bug bounty
Sajjad Hossan, born on February 6, 2006, in Bangladesh, is a young and exceptionally talented…
Medium
Sajjad Hossan, born on February 6, 2006, in Bangladesh, is a young and exceptionally talented…
ABOUT THE STORY
hack and bug bounty
The Windows Process Journey — “takeown.exe” (Takes Ownership of a File)
Medium
The Windows Process Journey — “takeown.exe” (Takes Ownership of a File)
“takeown.exe” (Takes ownership of a file) is a PE binary located at “%windir%\System32\takeown.exe”. It is a CLI tool which allows an…
hack and bug bounty
Writeups for Damn Vulnerable Web Application (DVWA)
Medium
Writeups for Damn Vulnerable Web Application (DVWA)
DVWA Writeups
hack and bug bounty
October is here… The Cybersecurity Awareness Month
Medium
October is here… The Cybersecurity Awareness Month
In today's world, where our lives are increasingly shaped by technology, there's a pressing need for us all to become more aware of the…
hack and bug bounty
The Rise of Rust
Medium
The Rise of Rust
In the world of system-level programming, a new titan has emerged, challenging the age-old dominion of languages like C and C++. Enter…
hack and bug bounty
“Template Injection” The Future of Web Application Attacks
Medium
“Template Injection” The Future of Web Application Attacks
Introduction
hack and bug bounty
“Beyond SSTI” Advanced Template Injection Techniques for Bug Bounty Hunters
Medium
“Beyond SSTI” Advanced Template Injection Techniques for Bug Bounty Hunters
Introduction
hack and bug bounty
Top 5 Security Resources for 2023–10–1
Medium
Top 5 Security Resources for 2023–10–1
Here are my favorite 5 security resources added to my security resource database since yesterday. These resources will range from blogs and Reddit posts, through paid resource subscriptions and…
hack and bug bounty
2-Minutes Hacking
Medium
2-Minutes Hacking
Hack any device in 120 seconds
hack and bug bounty
Template Injection: The Unseen Menace of the Web
Medium
Template Injection: The Unseen Menace of the Web
Introduction
hack and bug bounty
Password Security: Let’s Hash This Out
Medium
Password Security: Let’s Hash This Out
The database containing the login credentials of millions of users of ilovecats.com has been compromised and, as a result, malicious…