hack and bug bounty
@hack_com
22
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
22 subscribers
hack and bug bounty
Open PDF Spy x Family, Vol. 6 (6) by Tatsuya Endo
Medium
Open PDF Spy x Family, Vol. 6 (6) by Tatsuya Endo
Review Spy x Family Vol by Tatsuya Endo
hack and bug bounty
Broken Authentication | Authentication Bypass by Assumed-Immutable Data; Part 2
Medium
Broken Authentication | Authentication Bypass by Assumed-Immutable Data; Part 2
After I successfully bypassed the OTP through response manipulation, I shifted towards finding vulnerabilities in the Feedback submission…
hack and bug bounty
Understanding Ethical Hacking: A Comprehensive Look at the Five Phases
Medium
Understanding Ethical Hacking: A Comprehensive Look at the Five Phases
The field of Ethical Hacking, also known as penetration testing, is a dynamic and critical aspect of modern cybersecurity. It involves a…
hack and bug bounty
Out-of-Band Exfiltration Tools
Medium
Out-of-Band Exfiltration Tools
In the ever-evolving landscape of cybersecurity, one area that has gained significant prominence is bug bounty programs. These initiatives…
hack and bug bounty
️♂️ Exploring Digital Forensics with windows (Certutil) command️♀️
Medium
🕵️♂️
Exploring Digital Forensics with windows (Certutil) command
🕵️♀️
Hello, fellow community members!
hack and bug bounty
OWASP Amass: Journey through the Cyber Threat Map
Medium
OWASP Amass: Journey through the Cyber Threat Map
OWASP Amass is an open source tool developed by the computer security community and maintained by the OWASP Foundation (Open Web…
hack and bug bounty
TCM — Blue Writeup
Medium
TCM — Blue Writeup
Start with a netdiscover -r 192.168.100.0/24 to find other endpoints on the same network. Here we see a couple other devices. The…
hack and bug bounty
Day 7: Zero-Day Vulnerabilities — How They Are Exploited and Mitigated
Medium
Day 7: Zero-Day Vulnerabilities — How They Are Exploited and Mitigated
Welcome back to my cybersecurity journey, where we delve into the fascinating world of online security. Today, I’ll be discussing a topic…
hack and bug bounty
Cyber Awareness Month: Day 7-Incident response Program in 10 steps
Medium
Cyber Awareness Month: Day 7-Incident response Program in 10 steps
An incidеnt rеsponsе program (IRP) is a sеt of policiеs and procеdurеs that dеfinе how an organization will rеspond to a sеcurity incidеnt…
hack and bug bounty
HTB: Starting Point — Explosion Machine
Medium
HTB: Starting Point — Explosion Machine
Penetration Test Report
hack and bug bounty
Sans Top 25
Medium
Sans Top 25
The SANS Top 25 is an important list put together by the SANS Institute, which is a well-known organization in the world of cybersecurity…
hack and bug bounty
Top 25 Common Software Errors
Medium
Top 25 Common Software Errors
Absolutely, here are comprehensive details and CWE codes for each of the mentioned software errors:
hack and bug bounty
CVE, CWE, and NDE
Medium
CVE, CWE, and NDE
CVE (Common Vulnerabilities and Exposures):
hack and bug bounty
Cyber Awareness Month: Day 8-Cyber Ecosystem
Medium
Cyber Awareness Month: Day 8-Cyber Ecosystem
A cybеr еcosystеm is a complеx and intеrconnеctеd systеm of pеoplе, tеchnologiеs, and procеssеs that intеract to support thе usе and…
hack and bug bounty
Day 8: Supply Chain Attacks — Protecting Your Organization from Third-Party Risks.
Medium
Day 8: Supply Chain Attacks — Protecting Your Organization from Third-Party Risks.
Welcome back to mycybersecurity awareness journey. I am diving into a critical topic, supply chain attacks. In our interconnected world…
hack and bug bounty
> 2
Medium
𝙋𝘼𝙍𝙏 > 2
𝙋𝘼𝙍𝙏 > 2
hack and bug bounty
what is BOUNTY BUG ?
Medium
what is BOUNTY BUG ?
Bug Bounty is a program that allows independent security researchers to report bugs to an organization and receive rewards or compensation.
hack and bug bounty
Elon Musk has to make a decision about the future of Community Notes
Medium
Elon Musk has to make a decision about the future of Community Notes
Community Notes is a feature that allows X users who have generally stuck to the rules, terms of use and privacy policies of what we used…
hack and bug bounty
How to Become a Penetration Tester: Job Description, Salary, and Skills
Medium
How to Become a Penetration Tester: Job Description, Salary, and Skills
In the world of cybersecurity, penetration testers, also known as ethical hackers, play a crucial role in identifying and mitigating…
hack and bug bounty
Unleashing the Power of DIRB: A Comprehensive Guide to the Web Directory Bruteforcing Tool
Medium
Unleashing the Power of DIRB: A Comprehensive Guide to the Web Directory Bruteforcing Tool
Introduction
In the world of web security testing, staying one step ahead of potential threats is crucial. One tool that has proven its…