hack and bug bounty
@hack_com
21
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
21 subscribers
hack and bug bounty
I was able to find SQL injection in military website.
Medium
I was able to find SQL injection in military website.
HI I want hope your all are having wonderful day my name is Imran today I am going to tell you how i was above to find SQL injection Using…
hack and bug bounty
Supply Chain Attacks: How to Mitigate OAuth Token Theft
Medium
Supply Chain Attacks: How to Mitigate OAuth Token Theft
With the rising dependency on SaaS services and token-based access comes great flexibility but also dangers that need to be mitigated.
hack and bug bounty
How can I obtain a $2k bounty solely based on curiosity?
Medium
How can I obtain a $2k bounty solely based on curiosity?
This is a good day to write a write-up. How can I earn a $2k bounty just by being curious about what is displayed in the search banner for…
hack and bug bounty
Bettercap and Ettercap: Ethical Hacking Tools for Network Analysis and Penetration Testing
Medium
Bettercap and Ettercap: Ethical Hacking Tools for Network Analysis and Penetration Testing
Introduction
hack and bug bounty
Mobile App Security: The Crucial Role of VAPT
Medium
Mobile App Security: The Crucial Role of VAPT
In today’s interconnected world, mobile applications have become an integral part of our daily lives. From shopping and banking to social…
hack and bug bounty
10 Tips for the Beginning Digital Writer Starting Out on
Medium
10 Tips for the Beginning Digital Writer Starting Out on 𝕏
I’ve been an online creator for 44 days, as of writing this. During that time, I’ve learned many valuable lessons along the way.
hack and bug bounty
How to Answer Everyday Questions, that Doesn't Give Away Personal Information
Medium
How to Answer Everyday Questions, that Doesn't Give Away Personal Information
(ARTICLE IS INCOMPLETE)
hack and bug bounty
8 Options for Reverse Image Search using Google Lens for OSINT
Medium
8 Options for Reverse Image Search using Google Lens for OSINT
Google lens is a powerful tool for reverse image searches. Here are 8 applications of this Google service.
hack and bug bounty
5+All Security Resource Digest for 2023–10–13
Medium
5+All Security Resource Digest for 2023–10–13
Here are my favorite 5 security resources added to my security resource database since yesterday. These resources will range from blogs and Reddit posts, through paid resource subscriptions and…
hack and bug bounty
Basic Pentesting — TryHackMe Writeup | Billa Infosec | BVW
Medium
Basic Pentesting — TryHackMe Writeup | Billa Infosec | BVW
First of all thank you for clicking on the link and I know that you are excited to learn about this stuff. We all are a community and I am…
hack and bug bounty
The New Insiders: A Comprehensive Exploration into the Fluid Boundaries of Inclusion and Exclusion
Medium
The New Insiders: A Comprehensive Exploration into the Fluid Boundaries of Inclusion and Exclusion
The Shifting Sands of Jargon and Identity
hack and bug bounty
Demystifying Ethereum Layer 1 and Layer 2: ZK Rollups, Optimistic Rollups, and More
Medium
Demystifying Ethereum Layer 1 and Layer 2: ZK Rollups, Optimistic Rollups, and More
The Ethereum network often faces issues like slow transactions and high gas prices due to congestion. This ongoing problem requires a more…
hack and bug bounty
The Domino Effect: How Multiple Bugs Lead to Account Takeover
Medium
The Domino Effect: How Multiple Bugs Lead to Account Takeover
If you’ve spent sufficient time on a cybersecurity assignment so that the bigger picture falls into place, you know that some issues will…
hack and bug bounty
KeePass Memory Leakage Vulnerability Analysis — CVE-2023–32784
Medium
KeePass Memory Leakage Vulnerability Analysis — CVE-2023–32784
Introduction
hack and bug bounty
A Malicious Python Repository fshec2 PyPI Attack Analysis
Medium
A Malicious Python Repository fshec2 PyPI Attack Analysis
Introduction
hack and bug bounty
GOING PASSWORDLESS WITH DSRM
Medium
GOING PASSWORDLESS WITH DSRM
Overview:
hack and bug bounty
CyberSecurity Red vs. Blue Teams in Action: Bridging the Cyber Gap
Medium
CyberSecurity Red vs. Blue Teams in Action: Bridging the Cyber Gap
The Ethical Hacker vs. The Digital Guardian: A Deep Look Into Cybersecurity’s Frontlines
hack and bug bounty
Hunting for Hidden Treasures: Unveiling the 403 Bypass Bug Bounty Adventure ️♂️
Medium
Hunting for Hidden Treasures: Unveiling the 403 Bypass Bug Bounty Adventure
🕵️♂️
💰
Hello there,
hack and bug bounty
CVE-2023–39308: User Feedback <= 1.0.7 — Unauthenticated Stored XSS
Medium
CVE-2023–39308: User Feedback <= 1.0.7 — Unauthenticated Stored XSS
Submit Feedback feature doesn’t filter submitted Text. So, Attacker can submit malicious script.
hack and bug bounty
AirBnb Bug Bounty: Turning Self-XSS into Good-XSS #2