hack and bug bounty
@hack_com
22
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
22 subscribers
hack and bug bounty
5+All Security Resource Digest for 2023–10–8
Medium
5+All Security Resource Digest for 2023–10–8
Here are my favorite 5 security resources added to my security resource database since yesterday. These resources will range from blogs and Reddit posts, through paid resource subscriptions and…
hack and bug bounty
Unveiling the Arsenal: A Comprehensive Guide to Penetration Testing Tools
Medium
Unveiling the Arsenal: A Comprehensive Guide to Penetration Testing Tools
hack and bug bounty
Embracing DevSecOps: The Future of Secure Software Development
Medium
Embracing DevSecOps: The Future of Secure Software Development
In today’s rapidly evolving digital landscape, the intersection of Development, Operations, Quality Assurance, and Security has given rise…
hack and bug bounty
Unveiling Veil: The Ethical Hacker’s Arsenal for Stealthy Payload Creation
Medium
Unveiling Veil: The Ethical Hacker’s Arsenal for Stealthy Payload Creation
Introduction
hack and bug bounty
MSFVenom: A Powerful Payload Generator
Medium
MSFVenom: A Powerful Payload Generator
Introduction
hack and bug bounty
RouterSploit: Unleashing the Power of Router Penetration Testing
Medium
RouterSploit: Unleashing the Power of Router Penetration Testing
Introduction
hack and bug bounty
Service Enumeration
Medium
Service Enumeration
Hello hackers I’m Mostafa Elguerdawi this will be the third write-up about Penetration Testing series, We will talk about service…
hack and bug bounty
Decoding Precision: Unveiling the Potential of Burp Suite’s Decoder Tool
Medium
Decoding Precision: Unveiling the Potential of Burp Suite’s Decoder Tool
In our unending pursuit of digital security excellence and mastery in the realm of ethical hacking, our compass once again points us…
hack and bug bounty
Abusing LFI vulnerabilities in file upload functionality
Medium
Abusing LFI vulnerabilities in file upload functionality
In the world of web security, Local File Inclusion (LFI) vulnerabilities continue to pose a significant threat to web applications. When…
hack and bug bounty
LFI attacks on serverless architecture
Medium
LFI attacks on serverless architecture
In the ever-evolving landscape of cybersecurity threats, serverless architecture has emerged as a game-changer, offering scalability…
hack and bug bounty
Python’s Role in Cybersecurity: An Average Coder’s Perspective
Medium
Python’s Role in Cybersecurity: An Average Coder’s Perspective
Python is a versatile programming language that finds its place in various domains, including web development, data analysis, and machine…
hack and bug bounty
What is Compliance in Cyber Security? (Important Concept)
Medium
What is Compliance in Cyber Security? (Important Concept)
With a growing awareness of data privacy and rising incidents of information security breaches, it’s essential that organisations manage…
hack and bug bounty
HackTheBox-Archetype(WriteUp)
Medium
HackTheBox-Archetype(WriteUp)
Hello lovely people! I hope you are all doing great. Another one in the writeups list. Let’s Go.
hack and bug bounty
The Ultimate Hands-On Wireshark Course On Udemy by Chris Greer | Udemy/David Bombal
Medium
The Ultimate Hands-On Wireshark Course On Udemy by Chris Greer | Udemy/David Bombal
Chris Wireshark Course Review
hack and bug bounty
Malware Redirection
Medium
Malware Redirection
Malware Redirection
hack and bug bounty
“LFI attacks in modern web applications” Evading security controls
Medium
“LFI attacks in modern web applications” Evading security controls
In the ever-evolving landscape of web applications, security remains a top priority. Local File Inclusion (LFI) attacks are a persistent…
hack and bug bounty
“Exploiting LFI vulnerabilities in cloud infrastructure” A step-by-step guide
Medium
“Exploiting LFI vulnerabilities in cloud infrastructure” A step-by-step guide
As organizations increasingly migrate their applications and services to the cloud, the security of cloud infrastructure has become a…
hack and bug bounty
“LFI attacks on IoT devices” A case study
Medium
“LFI attacks on IoT devices” A case study
In an increasingly connected world, the Internet of Things (IoT) has become an integral part of our lives, revolutionizing the way we…
hack and bug bounty
Zero point zero one — HackTheBox & curiosity
Medium
Zero point zero one — The importance of curiosity
First impressions and what I’ve learned so far
hack and bug bounty
CVE, CWE and NVD
Medium
CVE, CWE and NVD
⚠️
Do you know what CVE, CWE, and NVD mean? It’s crucial to understand these terms to stay safe online! Let’s dive in and learn more…