hack and bug bounty
@hack_com
21
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
21 subscribers
hack and bug bounty
The Art of Google Dorking for Recon
Medium
The Art of Google Dorking for Recon
Hey there, fellow bug hunters and curious minds!
hack and bug bounty
SAP Penetration Testing Tools: Safeguarding Your Business-Critical Systems
Medium
SAP Penetration Testing Tools: Safeguarding Your Business-Critical Systems
In the realm of business-critical systems, SAP (Systems, Applications, and Products) stands tall as a global leader in enterprise resource…
hack and bug bounty
Understanding Server-Side Request Forgery (SSRF) — The Secret Paths
Medium
Understanding Server-Side Request Forgery (SSRF) — The Secret Paths
Server-Side Request Forgery (SSRF) is a security vulnerability that allows an attacker to induce a server-side application to make HTTP requests to an arbitrary domain of the attacker’s choosing…
hack and bug bounty
Insecure Deserialization Explained Through a Restaurant Analogy
Medium
Insecure Deserialization Explained Through a Restaurant Analogy
In the world of cybersecurity, the concept of insecure deserialization can often be a tough one to digest. Let’s try to understand it through the familiar setting of a restaurant. Imagine you’re at a…
hack and bug bounty
Cybersecurity: A Beginner’s Guide Using Simple Analogies
Medium
Cybersecurity: A Beginner’s Guide Using Simple Analogies
Cybersecurity is like having locks, alarms, and guards for your digital house (your computer, smartphone, and online accounts). Just as you protect your home from thieves, cybersecurity helps keep…
hack and bug bounty
Authentication Vulnerabilities Explained: A House Lock Analogy Guide
Medium
Authentication Vulnerabilities Explained: A House Lock Analogy Guide
Authentication is the process of verifying the identity of a user, system, or application. In cybersecurity and information technology, it’s a way to ensure that the entity requesting access to a…
hack and bug bounty
Digital Forensics Tools I Use For My Cyber Crime Investigation Part-II
Medium
Digital Forensics Tools I Use For My Cyber Crime Investigation Part-II
🔵
Hi, Ajak Amico’s welcome back to another blog. Last blog I promised if it hits 50 claps i will post the 2nd part. so Today, I will share…
hack and bug bounty
“AI in Business Unlocking Growth and Efficiency”
Medium
“AI in Business Unlocking Growth and Efficiency”
Artificial Intelligence (AI) has become a transformative force in the world of business. From enhancing decision-making processes to…
hack and bug bounty
“AI and Education Transforming Learning in the Digital Age”
Medium
“AI and Education Transforming Learning in the Digital Age”
The digital age has ushered in a wave of technological advancements that are reshaping our world in unprecedented ways. Among these…
hack and bug bounty
Unraveling the Secrets of NULL Sessions in SMB: A Comprehensive Ethical Hacking Guide
Medium
Unraveling the Secrets of NULL Sessions in SMB: A Comprehensive Ethical Hacking Guide
Introduction
hack and bug bounty
The Best Linux Distributions for Ethical Hacking (Updated)
Medium
The Best Linux Distributions for Ethical Hacking (Updated)
Linux Distributions That Will Make You a Master Ethical Hacker
hack and bug bounty
“AI and Bias Tackling Fairness and Inclusion”
Medium
“AI and Bias Tackling Fairness and Inclusion”
Artificial Intelligence (AI) has become an integral part of our daily lives, influencing decisions that range from job applications to…
hack and bug bounty
“AI in Art The Intersection of Creativity and Technology”
Medium
“AI in Art The Intersection of Creativity and Technology”
Art and technology have often been viewed as distinct realms of human expression. Art is a manifestation of human creativity, emotions, and…
hack and bug bounty
“AI and Sustainability Green Technologies for a Better World”
Medium
“AI and Sustainability Green Technologies for a Better World”
In an era defined by environmental challenges and the urgent need for sustainable solutions, artificial intelligence (AI) is emerging as a…
hack and bug bounty
20.1 Lab: Basic password reset poisoning | 2023
Medium
20.1 Lab: Basic password reset poisoning | 2023
This lab is vulnerable to password reset poisoning. The user Carlos will carelessly click on any links in emails that he receives. To solve…
hack and bug bounty
“The Future of AI Beyond Machine Learning and Deep Learning”
Medium
“The Future of AI Beyond Machine Learning and Deep Learning”
Artificial Intelligence (AI) has come a long way, and machine learning and deep learning have been the driving forces behind many of its…
hack and bug bounty
Twitter Creator Monetization Program: How to Earn for content creators
Medium
Twitter Creator Monetization Program: How to Earn for content creators
Are you a Twitter enthusiast looking for ways to turn your tweets into a steady stream of passive income? Twitter’s new Revenue Share…
hack and bug bounty
Race Conditions with pipelining
Medium
Race Conditions with pipelining
Hi guy’s
Approximately a year ago, I identified a race condition using pipelining technique that allowed me to add a significant number of…
hack and bug bounty
Spring Boot ile JSON Web Token (JWT) Kullanarak Güvenli Oturum Yönetimi-Örnek Uygulama
Medium
Spring Boot ile JSON Web Token (JWT) Kullanarak Güvenli Oturum Yönetimi-Örnek Uygulama
Dijital dünyada hızla büyüyen web uygulamaları ve API’ler, kullanıcıların çeşitli hizmetlere erişmesini, veri paylaşmasını ve iş yapmasını…
hack and bug bounty
Track Your Boyfriend’s Phone In Your Travel Time
Medium
Track Your Boyfriend’s Phone In Your Travel Time
In this age of technology, maintaining trust in a relationship can be challenging, especially when distance separates you and your partner…