hack and bug bounty
@hack_com
21
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
21 subscribers
hack and bug bounty
CTBB Podcast — Attack Vector Ideation
Medium
CTBB Podcast — Attack Vector Ideation
In this article, I share my views mixed with Justin’s ideas in his video
hack and bug bounty
What To Do After Choosing a Target? Part 01 | Bug Bounty
Medium
What To Do After Choosing a Target? Part 01 | Bug Bounty
This is the problem faced by most bug hunters in the beginning
hack and bug bounty
Top 5 Red Flags of Bug Bounty Program
Medium
Top 5 Red Flags of Bug Bounty Program
The critical skill of many top tier bug bounty hunters is to select the right program and dedicate their time.
hack and bug bounty
Simple Tips for Bug Bounty Beginners: Finding Open Redirect Bugs
Medium
Simple Tips for Bug Bounty Beginners: Finding Open Redirect Bugs
Message to every bug bounty hunter who is grinding to get their first bounty or to find their first bug:
hack and bug bounty
Tryhackme: Brooklyn Nine Nine Walkthrough
Medium
Tryhackme: Brooklyn Nine Nine Walkthrough
Hello everyone, this is a writeup on tryhackme challenge room Brooklyn Nine Nine.
hack and bug bounty
Secrets of Google Search
Medium
Secrets of Google Search
Ah, Google! The ultimate genie of the internet, granting us unlimited wishes through its search results.
hack and bug bounty
Which techniques do cell phone hackers use
Medium
Which techniques do cell phone hackers use
In today’s digitally connected world, cell phones have become an integral part of our lives. We use them for communication, social…
hack and bug bounty
How to Get Your Instagram Account Back After an Instagram Hack
Medium
How to Get Your Instagram Account Back After an Instagram Hack
In today’s digital world, Instagram has become a valuable platform for sharing memories, connecting with friends, and promoting businesses…
hack and bug bounty
RootMe — TryHackMe CTF Walkthrough
Medium
RootMe — TryHackMe CTF Walkthrough
Introduction
hack and bug bounty
TryHackMe(RootMe Room Walkthrough)
Medium
TryHackMe(RootMe Room Walkthrough)
Room Name: RootMe
hack and bug bounty
A Quick Price Manipulation
Medium
A Quick Price Manipulation
On July 13, 2023, I stumbled upon a security vulnerability in the popular online travel booking platform, Redacted.com. This website is…
hack and bug bounty
2FA bypass via bypassing the ratelimit
Medium
2FA bypass via bypassing the ratelimit
hello bug hunters and pen-tester today i’ll be explaining how i got a “2fa bypass”
hack and bug bounty
Ethical hacking and Russian hackers life
Medium
Ethical hacking and Russian hackers life
How can everything start?
hack and bug bounty
XPapers — Paying ‘Attention’ to your Dataset Mixture
Medium
XPapers — Paying ‘Attention’ to your Dataset Mixture
A simple method by which you can optimize the ratios of domains in your training dataset for your large-language-models.
hack and bug bounty
What is HTTP verb tampering and How to Exploit it?
Medium
What is HTTP verb tampering and How to Exploit it?
Http
hack and bug bounty
Managing ECS Application Secrets with AWS Parameter Store
Medium
Managing ECS Application Secrets with AWS Parameter Store
In this era of cloud computing and container orchestration, security is a top most priority. Whether we’re running a small-scale web…
hack and bug bounty
CVE-2023–46747- How to Fix the Critical Remote Code Execution Vulnerability in BIG-IP?
Medium
CVE-2023–46747- How to Fix the Critical Remote Code Execution Vulnerability in BIG-IP?
CVE-2023–46747 refers to an authentication bypass vulnerability that was recently discovered in F5 Networks’ BIG-IP products. This…
hack and bug bounty
SQL Injection Attacks: How They Work and How to Stop Them
Medium
SQL Injection Attacks: How They Work and How to Stop Them
by Prateek Kuber
hack and bug bounty
OSV-Scanner: Protecting Your Open-Source Dependencies
Medium
OSV-Scanner: Protecting Your Open-Source Dependencies
In today’s digital age, cyber security threats are becoming increasingly prevalent and sophisticated. As a result, organizations need to…
hack and bug bounty
Cross-Origin Resource Sharing (CORS)
Medium
Cross-Origin Resource Sharing (CORS)
Cross-Origin Resource Sharing (CORS) is a mechanism that uses HTTP headers to define origins that the browser permit loading resouces.