hack and bug bounty
@hack_com
21
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
21 subscribers
hack and bug bounty
How I Could Get Anyone Arrested Knowing Their IP Address
Medium
How I Could Get Anyone Arrested Knowing Their IP Address
Few ISP might allocate single IP to multiple persons or allocate IP’s dynamically. (In these cases this technique might not work correctly) Okay, what can a attacker accomplish by knowing public ip…
hack and bug bounty
Akamai Bypass! Advanced XSS.
Medium
Akamai Bypass! Advanced XSS.
In the name of God
hack and bug bounty
ChatGPT for Bug Bounty: Top Prompts for Automation
Medium
ChatGPT for Bug Bounty: Top Prompts for Automation
Top-tier Security Researchers are actively adopting ChatGPT in Cybersecurity. Let’s explore the most common ChatGPT prompts for Bug Bounty.
hack and bug bounty
A web cache deception chained to a CSRF, the recipe
Medium
A web cache deception chained to a CSRF, the recipe
Recently, I received a bounty for a vulnerability discovered on an e-commerce site allowing the personal information — including the…
hack and bug bounty
CTBB Podcast — Attack Vector Ideation
Medium
CTBB Podcast — Attack Vector Ideation
In this article, I share my views mixed with Justin’s ideas in his video
hack and bug bounty
What To Do After Choosing a Target? Part 01 | Bug Bounty
Medium
What To Do After Choosing a Target? Part 01 | Bug Bounty
This is the problem faced by most bug hunters in the beginning
hack and bug bounty
Top 5 Red Flags of Bug Bounty Program
Medium
Top 5 Red Flags of Bug Bounty Program
The critical skill of many top tier bug bounty hunters is to select the right program and dedicate their time.
hack and bug bounty
Simple Tips for Bug Bounty Beginners: Finding Open Redirect Bugs
Medium
Simple Tips for Bug Bounty Beginners: Finding Open Redirect Bugs
Message to every bug bounty hunter who is grinding to get their first bounty or to find their first bug:
hack and bug bounty
Tryhackme: Brooklyn Nine Nine Walkthrough
Medium
Tryhackme: Brooklyn Nine Nine Walkthrough
Hello everyone, this is a writeup on tryhackme challenge room Brooklyn Nine Nine.
hack and bug bounty
Secrets of Google Search
Medium
Secrets of Google Search
Ah, Google! The ultimate genie of the internet, granting us unlimited wishes through its search results.
hack and bug bounty
Which techniques do cell phone hackers use
Medium
Which techniques do cell phone hackers use
In today’s digitally connected world, cell phones have become an integral part of our lives. We use them for communication, social…
hack and bug bounty
How to Get Your Instagram Account Back After an Instagram Hack
Medium
How to Get Your Instagram Account Back After an Instagram Hack
In today’s digital world, Instagram has become a valuable platform for sharing memories, connecting with friends, and promoting businesses…
hack and bug bounty
RootMe — TryHackMe CTF Walkthrough
Medium
RootMe — TryHackMe CTF Walkthrough
Introduction
hack and bug bounty
TryHackMe(RootMe Room Walkthrough)
Medium
TryHackMe(RootMe Room Walkthrough)
Room Name: RootMe
hack and bug bounty
A Quick Price Manipulation
Medium
A Quick Price Manipulation
On July 13, 2023, I stumbled upon a security vulnerability in the popular online travel booking platform, Redacted.com. This website is…
hack and bug bounty
2FA bypass via bypassing the ratelimit
Medium
2FA bypass via bypassing the ratelimit
hello bug hunters and pen-tester today i’ll be explaining how i got a “2fa bypass”
hack and bug bounty
Ethical hacking and Russian hackers life
Medium
Ethical hacking and Russian hackers life
How can everything start?
hack and bug bounty
XPapers — Paying ‘Attention’ to your Dataset Mixture
Medium
XPapers — Paying ‘Attention’ to your Dataset Mixture
A simple method by which you can optimize the ratios of domains in your training dataset for your large-language-models.
hack and bug bounty
What is HTTP verb tampering and How to Exploit it?
Medium
What is HTTP verb tampering and How to Exploit it?
Http
hack and bug bounty
Managing ECS Application Secrets with AWS Parameter Store
Medium
Managing ECS Application Secrets with AWS Parameter Store
In this era of cloud computing and container orchestration, security is a top most priority. Whether we’re running a small-scale web…