hack and bug bounty
@hack_com
21
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
21 subscribers
hack and bug bounty
How to move your following from X to Threads (or anywhere)
Medium
How to move your following from X to Threads (or anywhere)
Thanks to recent breaking news misinformation drowning the network, and Musk’s ‘pay or further ‘enshitification’ until you do’ policy…
hack and bug bounty
Defending Against SIM Swap Attacks: How Cloaked Wireless Enhances Security
Medium
Defending Against SIM Swap Attacks: How Cloaked Wireless Enhances Security
In an increasingly interconnected world, mobile devices are an integral part of our daily lives. We use them for communication, work, and…
hack and bug bounty
How I Uncovered a Stored XSS in octenium.com
Medium
How I Uncovered a Stored XSS in octenium.com
Hey folks,
hack and bug bounty
Earn Money with Fun! Find Vulnerability in Random Sites
Medium
Earn Money with Fun! Find Vulnerability in Random Sites
This article I will tell you about how I make money from sites that do not have a Bug bounty program, because I think this is very…
hack and bug bounty
A Practical Guide to Google Dorking | Day13 of 30DaysOfOSINT
Medium
A Practical Guide to Google Dorking | Day13 of 30DaysOfOSINT
The main aim of writing this blog is to get you all familiar with basic google dorks and their use cases.
hack and bug bounty
SQL Injection on HTTP Headers: Live Hacking
Medium
SQL Injection on HTTP Headers: Live Hacking
Custom HTTP Header Exposed
hack and bug bounty
✔
- …
Medium
✔
𝙰 𝚣𝚎𝚛𝚘-𝚌𝚕𝚒𝚌𝚔 𝚊𝚝𝚝𝚊𝚌𝚔 𝚝𝚊𝚔𝚎𝚜 𝚊𝚍𝚟𝚊𝚗𝚝𝚊𝚐𝚎 𝚘𝚏…
✔
𝙰 𝚣𝚎𝚛𝚘-𝚌𝚕𝚒𝚌𝚔 𝚊𝚝𝚝𝚊𝚌𝚔 𝚝𝚊𝚔𝚎𝚜 𝚊𝚍𝚟𝚊𝚗𝚝𝚊𝚐𝚎 𝚘𝚏 𝚟𝚞𝚕𝚗𝚎𝚛𝚊𝚋𝚒𝚕𝚒𝚝𝚒𝚎𝚜 𝚒𝚗 𝚜𝚘𝚏𝚝𝚠𝚊𝚛𝚎 𝚝𝚘 𝚌𝚊𝚛𝚛𝚢 𝚘𝚞𝚝 𝚊𝚗 𝚊𝚝𝚝𝚊𝚌𝚔 𝚠𝚒𝚝𝚑𝚘𝚞𝚝 𝚞𝚜𝚎𝚛 𝚒𝚗𝚝𝚎𝚛𝚊𝚌𝚝𝚒𝚘𝚗. 𝙱𝚢 𝚎𝚡𝚙𝚕𝚘𝚒𝚝𝚒𝚗𝚐 𝚝𝚑𝚒𝚜 𝚟𝚞𝚕𝚗𝚎𝚛𝚊𝚋𝚒𝚕𝚒𝚝𝚢, 𝚝𝚑𝚎 𝚎𝚡𝚙𝚕𝚘𝚒𝚝 𝚌𝚊𝚗 𝚒𝚗𝚜𝚝𝚊𝚕𝚕 𝚖𝚊𝚕𝚠𝚊𝚛𝚎 𝚘𝚛 𝚙𝚎𝚛𝚏𝚘𝚛𝚖 𝚘𝚝𝚑𝚎𝚛 𝚖𝚊𝚕𝚒𝚌𝚒𝚘𝚞𝚜 𝚒𝚗𝚝𝚎𝚛𝚊𝚌𝚝𝚒𝚘𝚗𝚜 𝚘𝚗 𝚊 𝚞𝚜𝚎𝚛’𝚜 𝚍𝚎𝚟𝚒𝚌𝚎 𝚠𝚒𝚝𝚑𝚘𝚞𝚝 𝚝𝚑𝚎 𝚝𝚊𝚛𝚐𝚎𝚝…
hack and bug bounty
Day 104 — Mastering Penetration Tester : World of Ethical Hacking
Medium
Day 104 — Mastering Penetration Tester : World of Ethical Hacking
Welcome to the 104th day of our incredible journey through the intricate web of cybersecurity!
hack and bug bounty
Free Ethical Hacking (Penetration Testing) Workshop: Your Gateway to Cybersecurity Skills!
Medium
Free Ethical Hacking (Penetration Testing) Workshop: Your Gateway to Cybersecurity Skills!
Hey there, tech enthusiasts and curious minds! We’ve got some exciting news to share. Hexa Defend is hosting a Free Ethical Hacking…
hack and bug bounty
Difference Between Hacking and Ethical Hacking?
Medium
Difference Between Hacking and Ethical Hacking?
hack and bug bounty
The Power of Write-Ups: Enhancing Skills and Knowledge
Medium
The Power of Write-Ups: Enhancing Skills and Knowledge
Write-ups, in the form of articles, essays, and documentation, have emerged as a powerful tool for improving and enhancing various skills…
hack and bug bounty
TryHackMe-Basic Pentesting (WriteUp)
Medium
TryHackMe-Basic Pentesting (WriteUp)
Greetings People! I hope you’re all doing great. Another one in the writeups list.
hack and bug bounty
Unmasking Vulnerabilities: A Deep Dive into ShellShock Exploitation
Medium
Unmasking Vulnerabilities: A Deep Dive into ShellShock Exploitation
Introduction
hack and bug bounty
Unleashing the Power of Burp Suite in Cybersecurity: A Comprehensive Guide
Medium
Unleashing the Power of Burp Suite in Cybersecurity: A Comprehensive Guide
Introduction
hack and bug bounty
WIFI Pineapple : DIY WIFI Pineapple Setup Guide
Medium
WIFI Pineapple : DIY WIFI Pineapple Setup Guide
I was just poking around for new projects and stumbled upon something cool. I’ve always had my eye on the Hak5 Wi-Fi Pineapple to build up…
hack and bug bounty
Day 10: Insider Threats — Identifying and Mitigating Risks from Within
Medium
Day 10: Insider Threats — Identifying and Mitigating Risks from Within
Today, we’re diving into a topic that might sound like it’s straight out of a spy thriller but is all too real in the digital age, insider…
hack and bug bounty
Explanation of OWASP Top 10: Protecting Your Web Apps
Medium
Explanation of OWASP Top 10: Protecting Your Web Apps
Discover how to secure your web applications with OWASP Top 10 guidelines. Explore pros, cons, and practical code examples.
hack and bug bounty
5+All Security Resource Digest for 2023–10–10
Medium
5+All Security Resource Digest for 2023–10–10
Here are my favorite 5 security resources added to my security resource database since yesterday. These resources will range from blogs and Reddit posts, through paid resource subscriptions and…
hack and bug bounty
Apple Mail Leaks Sensitive Information About Your Location And Device
Medium
Apple Mail Leaks Sensitive Information About Your Location And Device
Mail has come a long way. From the good old days of physical letters wrapped in envelopes sent on journeys that spanned days or weeks to…
hack and bug bounty
Securing APIs using Spring Security Default Configuration
Medium
Securing APIs using Spring Security Default Configuration
Get introduced to Spring Security by securing APIs in a simple Spring Boot App