hack and bug bounty
@hack_com
21
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
21 subscribers
hack and bug bounty
Chaining Cache Poisoning To Stored XSS
Medium
Chaining Cache Poisoning To Stored XSS
One of the benefits of being a developer is that you can guess how stuff is working at the server end. You can try to debug how the…
hack and bug bounty
Chaining Tricky OAuth Exploitation To Stored XSS
Medium
Chaining Tricky OAuth Exploitation To Stored XSS
Hey everyone, hope you all are having a great 2019 so far.
hack and bug bounty
A Simple CORS Misconfig Leaked Private Post Of Twitter, Facebook & Instagram
Medium
A Simple CORS Misconfig Leaked Private Post Of Twitter, Facebook & Instagram
Hey Everyone, this is my first story on Medium(one of my friend told me how easy and productive Medium is). If you want to read my…
hack and bug bounty
Cloud Access Security Broker Market Size, Latest Trends, Revenue Growth & Key Companies
Medium
Cloud Access Security Broker Market Size, Latest Trends, Revenue Growth & Key Companies
According to a new report published by Allied Market Research, titled, “Cloud Access Security Broker Market,” The Cloud Access Security…
hack and bug bounty
SAST vs DAST: Apa metode terbaik untuk pengujian keamanan aplikasi ?
Medium
SAST vs DAST: Apa metode terbaik untuk pengujian keamanan aplikasi ?
SAST dan DAST adalah metodologi pengujian keamanan aplikasi yang digunakan untuk menemukan kerentanan keamanan yang dapat membuat… read…
hack and bug bounty
Learning Thick Client VAPT with me.
Medium
Learning Thick Client VAPT with me.
Hey there.
hack and bug bounty
Learning Thick Client VAPT with me. Part 9. Source Code Analysis.
Medium
Learning Thick Client VAPT with me. Part 9. Source Code Analysis.
Hey all.
hack and bug bounty
How to secure JavaScript applications right from the CLI
Medium
How to secure JavaScript applications right from the CLI
According to Snyk’s 2022 State of Open Source Security report, the average JavaScript project has 49 vulnerabilities, including common ones like unsafe dependencies, cross-site scripting (XSS), weak…
hack and bug bounty
Learning Thick Client VAPT with me.
Medium
Learning Thick Client VAPT with me.
Hey all.
hack and bug bounty
Learning Thick Client VAPT with me. Part 7. DLL Injection.
Medium
Learning Thick Client VAPT with me. Part 7. DLL Hijacking.
Hey all.
hack and bug bounty
Learning Thick Client VAPT with me. Part 6. Account Takeover.
Medium
Learning Thick Client VAPT with me. Part 6. Account Takeover.
Hey all.
hack and bug bounty
Learning Thick Client VAPT with me. Part 5. Verify and Strings.
Medium
Learning Thick Client VAPT with me. Part 5. Verify and Strings.
Hey all.
hack and bug bounty
Best Practices for Writing Quality Vulnerability Reports
Medium
Best Practices for Writing Quality Vulnerability Reports
How to write great vulnerability reports? If you’re a security consultant, penetration tester or a bug bounty hunter these tips are for…
hack and bug bounty
Citrix Bleed: CVE-2023–4966
Medium
Citrix Bleed: CVE-2023–4966
CVE-2023–4966, another vulnerability associated with Citrix, presents a significant concern. This sensitive information disclosure…
hack and bug bounty
“From Raw Data to Actionable Insights A Data Science Journey”
Medium
“From Raw Data to Actionable Insights A Data Science Journey”
In the modern age of information, data is everywhere. It flows from our devices, our interactions, and our daily lives, creating a vast…
hack and bug bounty
“Breaking Boundaries Innovations in Data Science You Need to Know”
Medium
“Breaking Boundaries Innovations in Data Science You Need to Know”
Data science is a dynamic field that continually evolves, driven by the relentless pursuit of innovation and excellence. In this article…
hack and bug bounty
“Data-driven Decisions Transforming Businesses with Data Science”
Medium
“Data-driven Decisions Transforming Businesses with Data Science”
In today’s fast-paced and data-rich world, businesses that harness the power of data gain a substantial competitive advantage. Data…
hack and bug bounty
“Data Science Demystified Making Sense of Complex Algorithms”
Medium
“Data Science Demystified Making Sense of Complex Algorithms”
Data science, with its dazzling array of algorithms and models, often seems like a mysterious world, accessible only to those with advanced…
hack and bug bounty
16.3 Lab: Clickjacking with a frame buster script | 2023
Medium
16.3 Lab: Clickjacking with a frame buster script | 2023
This lab is protected by a frame buster which prevents the website from being framed. Can you get around the frame buster and conduct a…
hack and bug bounty
Git Rekt #2 – Steghide