hack and bug bounty
@hack_com
21
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
21 subscribers
hack and bug bounty
Tryhackme: Brooklyn Nine Nine Walkthrough
Medium
Tryhackme: Brooklyn Nine Nine Walkthrough
Hello everyone, this is a writeup on tryhackme challenge room Brooklyn Nine Nine.
hack and bug bounty
Secrets of Google Search
Medium
Secrets of Google Search
Ah, Google! The ultimate genie of the internet, granting us unlimited wishes through its search results.
hack and bug bounty
Which techniques do cell phone hackers use
Medium
Which techniques do cell phone hackers use
In today’s digitally connected world, cell phones have become an integral part of our lives. We use them for communication, social…
hack and bug bounty
How to Get Your Instagram Account Back After an Instagram Hack
Medium
How to Get Your Instagram Account Back After an Instagram Hack
In today’s digital world, Instagram has become a valuable platform for sharing memories, connecting with friends, and promoting businesses…
hack and bug bounty
RootMe — TryHackMe CTF Walkthrough
Medium
RootMe — TryHackMe CTF Walkthrough
Introduction
hack and bug bounty
TryHackMe(RootMe Room Walkthrough)
Medium
TryHackMe(RootMe Room Walkthrough)
Room Name: RootMe
hack and bug bounty
A Quick Price Manipulation
Medium
A Quick Price Manipulation
On July 13, 2023, I stumbled upon a security vulnerability in the popular online travel booking platform, Redacted.com. This website is…
hack and bug bounty
2FA bypass via bypassing the ratelimit
Medium
2FA bypass via bypassing the ratelimit
hello bug hunters and pen-tester today i’ll be explaining how i got a “2fa bypass”
hack and bug bounty
Ethical hacking and Russian hackers life
Medium
Ethical hacking and Russian hackers life
How can everything start?
hack and bug bounty
XPapers — Paying ‘Attention’ to your Dataset Mixture
Medium
XPapers — Paying ‘Attention’ to your Dataset Mixture
A simple method by which you can optimize the ratios of domains in your training dataset for your large-language-models.
hack and bug bounty
What is HTTP verb tampering and How to Exploit it?
Medium
What is HTTP verb tampering and How to Exploit it?
Http
hack and bug bounty
Managing ECS Application Secrets with AWS Parameter Store
Medium
Managing ECS Application Secrets with AWS Parameter Store
In this era of cloud computing and container orchestration, security is a top most priority. Whether we’re running a small-scale web…
hack and bug bounty
CVE-2023–46747- How to Fix the Critical Remote Code Execution Vulnerability in BIG-IP?
Medium
CVE-2023–46747- How to Fix the Critical Remote Code Execution Vulnerability in BIG-IP?
CVE-2023–46747 refers to an authentication bypass vulnerability that was recently discovered in F5 Networks’ BIG-IP products. This…
hack and bug bounty
SQL Injection Attacks: How They Work and How to Stop Them
Medium
SQL Injection Attacks: How They Work and How to Stop Them
by Prateek Kuber
hack and bug bounty
OSV-Scanner: Protecting Your Open-Source Dependencies
Medium
OSV-Scanner: Protecting Your Open-Source Dependencies
In today’s digital age, cyber security threats are becoming increasingly prevalent and sophisticated. As a result, organizations need to…
hack and bug bounty
Cross-Origin Resource Sharing (CORS)
Medium
Cross-Origin Resource Sharing (CORS)
Cross-Origin Resource Sharing (CORS) is a mechanism that uses HTTP headers to define origins that the browser permit loading resouces.
hack and bug bounty
ประสบการณ์การทำงาน 1 ปีกับการเป็น Penetration Tester
Medium
ประสบการณ์การทำงาน 1 ปีกับการเป็น Penetration Tester
Penetration Tester คือใคร?
hack and bug bounty
Boss Of The SOC (BOTS) v1 — Threat Hunting with Splunk (II)
Medium
Boss Of The SOC (BOTS) v1 — Threat Hunting with Splunk (II)
Description
hack and bug bounty
The 6 Best Ethical Hacking Courses for Beginners | Careervira
Medium
The 6 Best Ethical Hacking Courses for Beginners | Careervira
Discover the six best ethical hacking courses for beginners, designed to equip you with essential cybersecurity skills and knowledge.
hack and bug bounty
“Visualizing Data The Art of Creating Impactful Data Representations”
Medium
“Visualizing Data The Art of Creating Impactful Data Representations”
Data, when presented in its raw form, can be overwhelming and difficult to decipher. The art of data visualization offers a solution to…