hack and bug bounty
@hack_com
22
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
22 subscribers
hack and bug bounty
Day 1: Introduction to Cybersecurity Awareness Month — The Importance of Cybersecurity Education
Medium
Day 1: Introduction to Cybersecurity Awareness Month — The Importance of Cybersecurity Education
Welcome to Cybersecurity Awareness Month! In this month-long journey, I will delve into the fascinating and ever-evolving world of…
hack and bug bounty
Twitter’s entry into the recruitment product.
Medium
Twitter’s entry into the recruitment product.
Twitter (X) will now let verified company handles share job postings. The job postings will be visible on the profile page, and people can…
hack and bug bounty
A guide on how to reproduce a bug in Software Development
Medium
A guide on how to reproduce a bug in Software Development
Recreating a bug in software development involves reproducing the issue or error that occurred during the software’s ops. This process…
hack and bug bounty
Explore the World of Network Scanning with Nmap Commands!
Medium
🌐
Explore the World of Network Scanning with Nmap Commands!
🌐
🔍
Hey fellow tech enthusiasts! Ever wondered how to uncover the hidden secrets of a network? Look no further than Nmap, your trusty…
hack and bug bounty
TryHackMe — Athena Walkthrough
Medium
TryHackMe — Athena Walkthrough
On a hot September afternoon, I thought I could relax by playing around with a machine available on TryHackMe. In the end, I decided to go with “Athena.” I must admit that I found every phase of the…
hack and bug bounty
Explore the World of Cybersecurity Scanning Tools!
Medium
🔐
🔍
Explore the World of Cybersecurity Scanning Tools!
🔍
🔐
Hey #CybersecurityEnthusiasts
👨💻
👩💻
hack and bug bounty
InfoSecSherpa’s News Roundup for Sunday, October 1, 2023
Medium
InfoSecSherpa’s News Roundup for Sunday, October 1, 2023
InfoSecSherpa: Your Guide Up a Mountain of Information!
hack and bug bounty
ROADMAP to OSCP in 6 months starting from scratch️♂️
Medium
ROADMAP to OSCP in 6 months
👨💻
starting from scratch
🏋️♂️
Basics: ~ First get your foundations clear and strong. > Start with Networking topics like TCP, UDP, HTTP, DNS, DHCP and ARP
hack and bug bounty
Services Runtime Security — Part 4
Medium
Services Runtime Security — Part 4
An Alternate Approach
hack and bug bounty
My Bug Bounty Journey & Ranking 15th in U.S…
Medium
My Bug Bounty Journey & Ranking 15th in U.S…
Hello,
hack and bug bounty
Cyber Awareness Month: Day 1 — Who requires Cyber Security?
Medium
Cyber Awareness Month: Day 1 — Who requires Cyber Security?
A common question by many people is that I do not work in the IT industry or related to computers through profession. And, is…
hack and bug bounty
$1000 Bug using simple Graphql Introspection query
Medium
$1000 Bug using simple Graphql Introspection query
Welcome to my blog! In this post, I will be discussing my experience in the security testing of an application’s implementation of…
hack and bug bounty
Exploring Web3 Bug Bounty Programs
Medium
Exploring Web3 Bug Bounty Programs
Creating a safe Web3 is like building a super strong castle, with each digital brick adding to the decentralized structure and keeping it…
hack and bug bounty
11 Tools For Mastering Ethical Hacking
Medium
11 Tools For Mastering Ethical Hacking
A Comprehensive Guide
hack and bug bounty
Intro to Syscalls & Windows internals for malware development Pt.1
Medium
Intro to Syscalls & Windows internals for malware development Pt.1
Hello Everyone, over the years I’ve written many articles/summaries that for some reason I kept to myself and didn’t think to share them…
hack and bug bounty
Gaining Admin Access via GraphQL
Medium
Gaining Admin Access via GraphQL
This is a simple story about chaining 2 vulnerabilities to gain access to an administrative website. I’m going to share the thought process…
hack and bug bounty
A Practical Playbook to Ethical Web Hacking— Contents Based on TryHackMe Jr Penetration Tester…
Medium
A Practical Playbook to Ethical Web Hacking— Contents Based on TryHackMe Jr Penetration Tester Learning Path
Hello cybersecurity learners and enthusiasts! If you are relatively new to ethical web hacking, this is a good starter guide for you. Here…
hack and bug bounty
The Importance of Gap Analysis in ISO/IEC 27001 Version Transition
Medium
The Importance of Gap Analysis in ISO/IEC 27001 Version Transition
What is ISO 27001 Gap Analysis?
hack and bug bounty
ISO/IEC 27001:2022 Version Transition
Medium
ISO/IEC 27001:2022 Version Transition
ISO/IEC 27001 Information Security Management System (ISMS) is the most effective way to provide managerial control over the information in…
hack and bug bounty
5+All Security Resource Digest for 2023–10–2
Medium
5+All Security Resource Digest for 2023–10–2
Here are my favorite 5 security resources added to my security resource database since yesterday. These resources will range from blogs and Reddit posts, through paid resource subscriptions and…