hack and bug bounty
@hack_com
21
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
21 subscribers
hack and bug bounty
2FA bypass via bypassing the ratelimit
Medium
2FA bypass via bypassing the ratelimit
hello bug hunters and pen-tester today i’ll be explaining how i got a “2fa bypass”
hack and bug bounty
Ethical hacking and Russian hackers life
Medium
Ethical hacking and Russian hackers life
How can everything start?
hack and bug bounty
XPapers — Paying ‘Attention’ to your Dataset Mixture
Medium
XPapers — Paying ‘Attention’ to your Dataset Mixture
A simple method by which you can optimize the ratios of domains in your training dataset for your large-language-models.
hack and bug bounty
What is HTTP verb tampering and How to Exploit it?
Medium
What is HTTP verb tampering and How to Exploit it?
Http
hack and bug bounty
Managing ECS Application Secrets with AWS Parameter Store
Medium
Managing ECS Application Secrets with AWS Parameter Store
In this era of cloud computing and container orchestration, security is a top most priority. Whether we’re running a small-scale web…
hack and bug bounty
CVE-2023–46747- How to Fix the Critical Remote Code Execution Vulnerability in BIG-IP?
Medium
CVE-2023–46747- How to Fix the Critical Remote Code Execution Vulnerability in BIG-IP?
CVE-2023–46747 refers to an authentication bypass vulnerability that was recently discovered in F5 Networks’ BIG-IP products. This…
hack and bug bounty
SQL Injection Attacks: How They Work and How to Stop Them
Medium
SQL Injection Attacks: How They Work and How to Stop Them
by Prateek Kuber
hack and bug bounty
OSV-Scanner: Protecting Your Open-Source Dependencies
Medium
OSV-Scanner: Protecting Your Open-Source Dependencies
In today’s digital age, cyber security threats are becoming increasingly prevalent and sophisticated. As a result, organizations need to…
hack and bug bounty
Cross-Origin Resource Sharing (CORS)
Medium
Cross-Origin Resource Sharing (CORS)
Cross-Origin Resource Sharing (CORS) is a mechanism that uses HTTP headers to define origins that the browser permit loading resouces.
hack and bug bounty
ประสบการณ์การทำงาน 1 ปีกับการเป็น Penetration Tester
Medium
ประสบการณ์การทำงาน 1 ปีกับการเป็น Penetration Tester
Penetration Tester คือใคร?
hack and bug bounty
Boss Of The SOC (BOTS) v1 — Threat Hunting with Splunk (II)
Medium
Boss Of The SOC (BOTS) v1 — Threat Hunting with Splunk (II)
Description
hack and bug bounty
The 6 Best Ethical Hacking Courses for Beginners | Careervira
Medium
The 6 Best Ethical Hacking Courses for Beginners | Careervira
Discover the six best ethical hacking courses for beginners, designed to equip you with essential cybersecurity skills and knowledge.
hack and bug bounty
“Visualizing Data The Art of Creating Impactful Data Representations”
Medium
“Visualizing Data The Art of Creating Impactful Data Representations”
Data, when presented in its raw form, can be overwhelming and difficult to decipher. The art of data visualization offers a solution to…
hack and bug bounty
“The Ethics of Data Science Navigating the Moral Dilemmas”
Medium
“The Ethics of Data Science Navigating the Moral Dilemmas”
In our increasingly data-driven world, data science has emerged as a powerful force for innovation, progress, and transformation. Yet, it…
hack and bug bounty
IWCON 3.0 Happening In Less Than 2 Months
Medium
IWCON 3.0 Happening In Less Than 2 Months
Have you booked your tickets yet?
hack and bug bounty
Cyber Risk Assessment in Financial Sector
Medium
Cyber Risk Assessment in Financial Sector
Introduction
hack and bug bounty
Tryhackme: Anonymous room walkthrough
Medium
Tryhackme: Anonymous room walkthrough
Hello everyone, This writeup covers tryhackme room: Anonymous.
hack and bug bounty
CVE Detection: A Thrilling Journey of Fun, Knowledge, and Profit- Bung Bounty Hunters
Medium
CVE Detection: A Thrilling Journey of Fun, Knowledge, and Profit- Bung Bounty Hunters
Exploring Potentially At-Risk Citrix Servers Using Shodan — CVE-2023–4966
hack and bug bounty
Mastering Windows Command-Line Tools and OS Features
Medium
Mastering Windows Command-Line Tools and OS Features
In today's digital age, cyber security and IT professionals need to be well-versed in the tools and features of Microsoft’s Windows…
hack and bug bounty
Not all the DLP Solutions are Equally Useful: How to Choose the System and not be Disappointed
Medium
Not all the DLP Solutions are Equally Useful: How to Choose the System and not be Disappointed
In this article, we are going to help you choose the right DLP class system for you.