hack and bug bounty
@hack_com
22
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
22 subscribers
hack and bug bounty
ChatGPT: The Ultimate Tool for Penetration Testers — SecurityCipher
Medium
ChatGPT: The Ultimate Tool for Penetration Testers — SecurityCipher
As a penetration tester or bug bounty hunter, you know the importance of having the right tools at your disposal. ChatGPT is a powerful AI…
hack and bug bounty
“The Art of Template Injection” An In-Depth Look at the Latest Attack Techniques
Medium
“The Art of Template Injection” An In-Depth Look at the Latest Attack Techniques
Introduction
hack and bug bounty
Exploring the DarkWeb for Crypto Attack Intelligence
Medium
Exploring the DarkWeb for Crypto Attack Intelligence
Introduction
hack and bug bounty
The Rise of Quantum-Safe Cryptography in the Age of Crypto-Attacks
Medium
The Rise of Quantum-Safe Cryptography in the Age of Crypto-Attacks
Introduction
hack and bug bounty
“Crypto-attacks in the Supply Chain” How Bug Bounty Hunters Can Help
Medium
“Crypto-attacks in the Supply Chain” How Bug Bounty Hunters Can Help
Introduction
hack and bug bounty
How To Become A Penetration Tester (Starting Point)
Medium
How To Become A Penetration Tester (Starting Point)
Embarking on Your Journey to Becoming a Penetration Tester: The Starting Point
hack and bug bounty
Mass hunting for misconfigured S3 buckets
Medium
Mass hunting for misconfigured S3 buckets
The Power of AXIOM Part 5
hack and bug bounty
Creating custom AXIOM modules
Medium
Creating custom AXIOM modules
Taking bug bounty to the next level
hack and bug bounty
How to Setup crAPI in ubuntu server and make it network accessible
Medium
How to Setup crAPI in ubuntu server and make it network accessible
In this article we gonna setup crAPI in ubuntu server in VMware player and make crAPI accessible on a network to in order to do a…
hack and bug bounty
The Essential Programming Languages for Cyber Security.
Medium
The Essential Programming Languages for Cyber Security.
Hello my dear hackers, this is your friend Sagar. Welcome back to my new article with another hot, importent and interesting topic, I hope you all are good, happy and secure at your home. Today we…
hack and bug bounty
Leaked Database and SMTP credentials through .env file
Medium
Leaked Database and SMTP credentials through .env file
Introduction
hack and bug bounty
RCE on Application’s Tracking Admin Panel
Medium
RCE on Application’s Tracking Admin Panel
In this blog post, we’ll explore some intriguing scenarios where the add extension functionality in a particular subdomain can be exploited to enable a Remote Code Execution vulnerability. The…
hack and bug bounty
Ways I followed to Bypass ‘403’ — Your checklist
Medium
Ways I followed to Bypass ‘403’ — Your checklist
Hello people! Hope you all are doing well.
hack and bug bounty
Frontend Fumbles: The 250$ Curious Case of API Key Permissions.
Medium
Frontend Fumbles: The 250$ Curious Case of API Key Permissions.
Today, we’re about to discuss one such twist — an issue that holds the power to disrupt the balance between security and access. In web…
hack and bug bounty
How to Discover API Subdomains? | API Hacking |
Medium
How to Discover API Subdomains? | API Hacking |
In this article, we will delve into the world of API subdomains, exploring their purpose, methods to discover them, and performing API…
hack and bug bounty
Bounty of an Insecure WebView (Part 1): XSS, but with Steroids
Medium
Bounty of an Insecure WebView (Part 1): XSS, but with Steroids
We all love our mobile apps, right? They make life easier, more fun, and keep us connected. But, did you know there’s a secret weapon…
hack and bug bounty
A Tale of Weird XSS into $100
Medium
A Tale of Weird XSS into $100
Hey Guys , How are you all ? . I hope so your doing good and healthy . So, Lets get started . So , I started searching for bugbounty…
hack and bug bounty
Bypass SMS Authentication To Account Takeover
Medium
Bypass SMS Authentication To Account Takeover
Haloo guys! Artikel kali ini membahas tentang bypass OTP.. dan menurut gw pribadi ini case yang cukup unik. Sebelum masuk ke…
hack and bug bounty
Day 1: Introduction to Cybersecurity Awareness Month — The Importance of Cybersecurity Education
Medium
Day 1: Introduction to Cybersecurity Awareness Month — The Importance of Cybersecurity Education
Welcome to Cybersecurity Awareness Month! In this month-long journey, I will delve into the fascinating and ever-evolving world of…
hack and bug bounty
Twitter’s entry into the recruitment product.
Medium
Twitter’s entry into the recruitment product.
Twitter (X) will now let verified company handles share job postings. The job postings will be visible on the profile page, and people can…