hack and bug bounty
@hack_com
21
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
21 subscribers
hack and bug bounty
Login Bypass and Full Account Takeover: SQL Exploits — Bug bounty
Medium
Login Bypass and Full Account Takeover: SQL Exploits — Bug bounty
Alright guys,
hack and bug bounty
Client-Side Encryption Bypass; Critical Data Breach By Manipulating ODATA Queries.
Medium
Client-Side Encryption Bypass; Critical Data Breach By Manipulating ODATA Queries.
During a recent Web Application Penetration Testing engagement, I encountered an Encryption Mechanism.
hack and bug bounty
What Hackers Can Do with Your Phone
Medium
What Hackers Can Do with Your Phone
In an increasingly connected world, our smartphones have become an integral part of our daily lives. We use them for communication…
hack and bug bounty
Understanding Windows Kernel Security: Two Views on Attacks and Defence in C++ and Rust
Medium
Understanding Windows Kernel Security: Two Views on Attacks and Defence in C++ and Rust
Introduction
hack and bug bounty
Exploring PowerShell Empire
Medium
Exploring PowerShell Empire
Introduction
hack and bug bounty
The trouble with Passkeys
Medium
The trouble with Passkeys
Passkeys promise to help retire the password with all its problems. But what are the problems unique to passkeys?
hack and bug bounty
Target Validation in Cybersecurity with Kali Linux
Medium
Target Validation in Cybersecurity with Kali Linux
Introduction
hack and bug bounty
Upcoming & Completed CTF Challenges 2023 — 2024
Medium
Upcoming & Completed CTF Challenges 2023 — 2024
I’m creating this blog to track my completed CTF’s between 2023 — 2024
hack and bug bounty
Best Ethical Hacking & Cybersecurity Courses in Kerala!
Medium
Best Ethical Hacking & Cybersecurity Courses in Kerala!
The Increase of Cyber Attacks leads to the Importance of Cybersecurity & Ethical Hacking. If you Are looking For the Best Ethical Hacking &…
hack and bug bounty
Exploring Ethical Hacking: A Comprehensive Guide
Medium
Exploring Ethical Hacking: A Comprehensive Guide
In today’s digital age, where data is the lifeblood of many industries, safeguarding sensitive information is paramount. This is where…
hack and bug bounty
TryHackMe CTF: Neighbour
Medium
TryHackMe CTF: Neighbour
Unveiling Vulnerabilities and Exploiting IODR in the Neighbough CTF Challenge
hack and bug bounty
Misconfiguration Leads to P1 XSS
Medium
Misconfiguration Leads to P1 XSS
Reflected XSS via Misconfiguration in Get Parameter
hack and bug bounty
5+All Security Resource Digest for 2023–10–31
Medium
5+All Security Resource Digest for 2023–10–31
Here are my favorite 5 security resources added to my security resource database since yesterday. These resources will range from blogs and Reddit posts, through paid resource subscriptions and…
hack and bug bounty
Manipulating PEB — Process Environment Block
Medium
Manipulating PEB — Process Environment Block
Hey there, folks! Today, we’re diving into a nitty-gritty world where digital trickery meets the guts of your computer. It’s all about…
hack and bug bounty
Cyber Briefing: 2023.10.31
Medium
Cyber Briefing: 2023.10.31
👉
What’s happening in cybersecurity today? Atlassian, Confluence, Wiki-Slack, BiBi-Linux, Israel, Ransomware, NetScaler, EleKtra-Leak…
hack and bug bounty
Mastering OWASP ZAProxy: Complete Tutorial and Practical Examples
Medium
Mastering OWASP ZAProxy: Complete Tutorial and Practical Examples
Welcome to our comprehensive tutorial on OWASP ZAProxy! In this video, we will take you through a detailed exploration of ZAProxy…
hack and bug bounty
Cyber Awareness Month: Day 25– Zero Trust
Medium
Cyber Awareness Month: Day 25– Zero Trust
Zero-trust is a relatively new security concept that is based on the principle “Never Trust, Always Verify.” With growing technology and…
hack and bug bounty
Elon Musk’s X Valued at Less Than Half Of Acquisition Price.
Medium
Elon Musk’s X Valued at Less Than Half Of Acquisition Price.
In a surprising turn of events, more than a year after billionaire Elon Musk acquired Twitter for a staggering $44 billion, the…
hack and bug bounty
Cyber Awareness Month: Day 26– Zero Trust Implementation
Medium
Cyber Awareness Month: Day 26– Zero Trust Implementation
How Does Zero Trust Work
hack and bug bounty
Critical Remote Code Execution Vulnerability in Mirth Connect Puts Healthcare Data at Risk…
Medium
Critical Remote Code Execution Vulnerability in Mirth Connect Puts Healthcare Data at Risk (CVE-2023–43208)
Mirth Connect, an open-source data integration platform used extensively across healthcare, contains a severe unauthenticated remote code…