hack and bug bounty
@hack_com
21
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
21 subscribers
hack and bug bounty
Understanding Windows Kernel Security: Two Views on Attacks and Defence in C++ and Rust
Medium
Understanding Windows Kernel Security: Two Views on Attacks and Defence in C++ and Rust
Introduction
hack and bug bounty
Exploring PowerShell Empire
Medium
Exploring PowerShell Empire
Introduction
hack and bug bounty
The trouble with Passkeys
Medium
The trouble with Passkeys
Passkeys promise to help retire the password with all its problems. But what are the problems unique to passkeys?
hack and bug bounty
Target Validation in Cybersecurity with Kali Linux
Medium
Target Validation in Cybersecurity with Kali Linux
Introduction
hack and bug bounty
Upcoming & Completed CTF Challenges 2023 — 2024
Medium
Upcoming & Completed CTF Challenges 2023 — 2024
I’m creating this blog to track my completed CTF’s between 2023 — 2024
hack and bug bounty
Best Ethical Hacking & Cybersecurity Courses in Kerala!
Medium
Best Ethical Hacking & Cybersecurity Courses in Kerala!
The Increase of Cyber Attacks leads to the Importance of Cybersecurity & Ethical Hacking. If you Are looking For the Best Ethical Hacking &…
hack and bug bounty
Exploring Ethical Hacking: A Comprehensive Guide
Medium
Exploring Ethical Hacking: A Comprehensive Guide
In today’s digital age, where data is the lifeblood of many industries, safeguarding sensitive information is paramount. This is where…
hack and bug bounty
TryHackMe CTF: Neighbour
Medium
TryHackMe CTF: Neighbour
Unveiling Vulnerabilities and Exploiting IODR in the Neighbough CTF Challenge
hack and bug bounty
Misconfiguration Leads to P1 XSS
Medium
Misconfiguration Leads to P1 XSS
Reflected XSS via Misconfiguration in Get Parameter
hack and bug bounty
5+All Security Resource Digest for 2023–10–31
Medium
5+All Security Resource Digest for 2023–10–31
Here are my favorite 5 security resources added to my security resource database since yesterday. These resources will range from blogs and Reddit posts, through paid resource subscriptions and…
hack and bug bounty
Manipulating PEB — Process Environment Block
Medium
Manipulating PEB — Process Environment Block
Hey there, folks! Today, we’re diving into a nitty-gritty world where digital trickery meets the guts of your computer. It’s all about…
hack and bug bounty
Cyber Briefing: 2023.10.31
Medium
Cyber Briefing: 2023.10.31
👉
What’s happening in cybersecurity today? Atlassian, Confluence, Wiki-Slack, BiBi-Linux, Israel, Ransomware, NetScaler, EleKtra-Leak…
hack and bug bounty
Mastering OWASP ZAProxy: Complete Tutorial and Practical Examples
Medium
Mastering OWASP ZAProxy: Complete Tutorial and Practical Examples
Welcome to our comprehensive tutorial on OWASP ZAProxy! In this video, we will take you through a detailed exploration of ZAProxy…
hack and bug bounty
Cyber Awareness Month: Day 25– Zero Trust
Medium
Cyber Awareness Month: Day 25– Zero Trust
Zero-trust is a relatively new security concept that is based on the principle “Never Trust, Always Verify.” With growing technology and…
hack and bug bounty
Elon Musk’s X Valued at Less Than Half Of Acquisition Price.
Medium
Elon Musk’s X Valued at Less Than Half Of Acquisition Price.
In a surprising turn of events, more than a year after billionaire Elon Musk acquired Twitter for a staggering $44 billion, the…
hack and bug bounty
Cyber Awareness Month: Day 26– Zero Trust Implementation
Medium
Cyber Awareness Month: Day 26– Zero Trust Implementation
How Does Zero Trust Work
hack and bug bounty
Critical Remote Code Execution Vulnerability in Mirth Connect Puts Healthcare Data at Risk…
Medium
Critical Remote Code Execution Vulnerability in Mirth Connect Puts Healthcare Data at Risk (CVE-2023–43208)
Mirth Connect, an open-source data integration platform used extensively across healthcare, contains a severe unauthenticated remote code…
hack and bug bounty
Hack the Box — Heist
Medium
Hack the Box — Heist
Paths: Intro to Dante
hack and bug bounty
Port 21 Exploit
Medium
Port 21 Exploit
🔍
🔎
HELLO there, I am back again with an technical blog — how to exploit open port or service of your target. In this blog I will share with…
hack and bug bounty
What is Insecure deserialization?
Medium
What is Insecure deserialization?
In this section, we’ll cover what insecure deserialization is and describe how it can potentially expose websites to high-severity attacks…