hack and bug bounty
@hack_com
22
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
22 subscribers
hack and bug bounty
“RCE through Deserialization” How to Exploit Java and .NET Applications
Medium
“RCE through Deserialization” How to Exploit Java and .NET Applications
In the world of cybersecurity, Remote Code Execution (RCE) is one of the most critical vulnerabilities that an application can face. It…
hack and bug bounty
Unveiling ServerSleuth: A Web Server Information Disclosure Checker
Medium
Unveiling ServerSleuth: A Web Server Information Disclosure Checker
In the vast landscape of web security, understanding potential vulnerabilities is crucial. Server information disclosure is one such area…
hack and bug bounty
403 Forbidden? No Problem, Here’s a POST XSS
Medium
403 Forbidden? No Problem, Here’s a POST XSS
Greetings to all the brilliant minds in the hacking community! I go by the name Remmy, and I’d like to share my experience with a…
hack and bug bounty
12.1 Lab: Detecting NoSQL injection | 2023
Medium
12.1 Lab: Detecting NoSQL injection | 2023
The product category filter for this lab is powered by a MongoDB NoSQL database. It is vulnerable to NoSQL injection. To solve the lab…
hack and bug bounty
The One with the Hacked Credentials: From Emails to Admin Access.
Medium
The One with the Hacked Credentials: From Emails to Admin Access.
(An iCSI CTF Challenge)
hack and bug bounty
Has Elon Musk ever said anything that is absolutely not true?
Medium
Has Elon Musk ever said anything that is absolutely not true?
Alright, let’s cut the fluff and get straight to the point. Elon Musk, the real-life Tony Stark, has done some wild stuff. From launching…
hack and bug bounty
A vulnerability in the Facebook
Medium
A vulnerability in the Facebook
A vulnerability in the Facebook platform on the web version allows you to change the name with an unlimited number of attempts, and with…
hack and bug bounty
Cyber Briefing: 2023.10.05
Medium
Cyber Briefing: 2023.10.05
👉
What’s going on in the cyber world today?
hack and bug bounty
Best Practices for Storing your AWS Credentials
Medium
Best Practices for Storing your AWS Credentials
Securely storing your cloud credentials for your apps or scripts is as important as building it in the first place, as it grantees the…
hack and bug bounty
“Bypassing WAFs for RCE” Techniques and Tools
Medium
“Bypassing WAFs for RCE” Techniques and Tools
Web Application Firewalls (WAFs) are essential components of modern web security infrastructure, designed to protect web applications from…
hack and bug bounty
“RCE through XXE” How to Exploit XML External Entity
Medium
“RCE through XXE” How to Exploit XML External Entity
In the ever-evolving landscape of cybersecurity, it’s crucial to understand and address vulnerabilities that can lead to remote code…
hack and bug bounty
A GUIDE TO OWASP API SECURITY 2023
Medium
A GUIDE TO OWASP API SECURITY 2023
So as we all know OWASP has recently released a 2023 version of the API security series which included new vulnerabilities in the OWASP API…
hack and bug bounty
What Is Penetration Testing In Detail.
Medium
What Is Penetration Testing In Detail.
Organizations must ensure that their networks are up to date and safe against any malicious activity in order to protect customer data…
hack and bug bounty
Know How Ethical Hackers Fortify Cybersecurity Professionally
Medium
Know How Ethical Hackers Fortify Cybersecurity Professionally
In the modern threat landscape, malicious actors are increasingly performing cyberattacks. The growth of vulnerabilities in the digital era…
hack and bug bounty
Title:
“Enhance Your Web Security!
Medium
Title:
“Enhance Your Web Security!
Description:
“I’m here to strengthen your website against cyber threats and identify potential security vulnerabilities. With my…
hack and bug bounty
#1 Insecure Password Storage — Secure Code Explain
Medium
#1 Insecure Password Storage — Secure Code Explain
Vulnerable Code
hack and bug bounty
Cyber Awareness Month: Day 4—Information Security Department
Medium
Cyber Awareness Month: Day 4—Information Security Department
Information security is an effort of many hands put together. With the evolution of digital space, new threats are seen on a daily basis…
hack and bug bounty
FFM, The Ultimate Hacking Tool
Medium
FFM, The Ultimate Hacking Tool
Freedom Fighting Mode (FFM)
hack and bug bounty
10 Freeee Threat Hunting tools to Supercharge Your Online Security
Medium
10 Freeee Threat Hunting tools to Supercharge Your Online Security
Threat hunting is an essential part of proactive cybersecurity, and there are several open-source tools and resources available for threat…
hack and bug bounty
From exam to hacking
Medium
From exam to hacking
The story begins with an error message that inspires me to do some hacking (SQL-I, RCE, Source Code Exposed, Privilege escalation).