hack and bug bounty
@hack_com
21
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
21 subscribers
hack and bug bounty
Unveiling MStore API 3.9.9: Unauthenticated Privilege Escalation
Medium
Unveiling MStore API 3.9.9: Unauthenticated Privilege Escalation
Description
hack and bug bounty
OSCP Certification: Beginner to Advanced Cyber Security Course | Penetration Testing with Kali…
Medium
OSCP Certification: Beginner to Advanced Cyber Security Course | Penetration Testing with Kali…
Download OSCP Course Material for free HERE
hack and bug bounty
Vulnhub — DC-1
Medium
Vulnhub — DC-1
This is a VM that can be downloaded from Vulnhub and run locally.
hack and bug bounty
SEPPUKU WALKTHROUGH PROVING GROUNDS
Medium
SEPPUKU WALKTHROUGH PROVING GROUNDS
1)RECONNAISSANCE
hack and bug bounty
The scan is not enough: why combining scans and pentesting is the best approach to vulnerability…
Medium
The scan is not enough: why combining scans and pentesting is the best approach to vulnerability…
How do you know if your organization has control on its vulnerabilities? Easy, you just run a scan, and then submit the identified…
hack and bug bounty
Try Hack Me — Sakura — Walkthrough
Medium
Try Hack Me — Sakura — Walkthrough
TASK 1: Introduction
hack and bug bounty
Monitor Your Children When You Are in Your Office
Medium
Monitor Your Children When You Are in Your Office
Keeping a Watchful Eye on Your Kids from the Workplace
hack and bug bounty
Discovering and Exploiting a XML External Entity (XXE) Vulnerability in a Public Bug Bounty Program
Medium
Discovering and Exploiting a XML External Entity (XXE) Vulnerability in a Public Bug Bounty Program
Introduction
hack and bug bounty
Project 2510: Bug Bounty Challenge — Day 1/25
Medium
Project 2510: Bug Bounty Challenge — Day 1/25
Greetings, welcome to Day 1.
hack and bug bounty
How I sent multiple payment requests on PhonePe, Paytm, and Google Pay
Medium
PS: Just shared this write-up for Knowledge Purposes. So please be aware while exploiting it. Also, the bug has already been submitted…
Good day ppl! This is Anudeep Vysyaraju, with a new write-up on how I sent multiple payment requests to users on their PhonePe, Paytm, and Google Pay. Razorpay helps you accept online payments from…
hack and bug bounty
LFI to RCE — Bug bounty
Medium
LFI to RCE — Bug bounty
Alright guys, in my latest post, I shared how a simple SQL query enabled me to take over an account. If you haven’t read it yet, go ahead…
hack and bug bounty
Chapter 5: Introduction to Cybersecurity
Medium
Chapter 5: Introduction to Cybersecurity
Protecting systems, networks, and data
hack and bug bounty
Nmap: Your Swiss Army Knife for Network Reconnaissance
Medium
Nmap: Your Swiss Army Knife for Network Reconnaissance
In the ever-evolving landscape of cybersecurity and network management, having the right tools at your disposal is crucial. One such…
hack and bug bounty
Understanding Infostealers.. (Must Read)
Medium
Understanding Infostealers.. (Must Read)
Personal data, corporate secrets, financial information, and intellectual property are just a few examples of the information that…
hack and bug bounty
Hack The Box | CTF Write-up | Lame
Medium
Hack The Box | CTF Write-up | Lame
This is my CTF write-up for the Hack The Box machine “Lame.”
hack and bug bounty
Understanding CRLF Injection
Medium
Understanding CRLF Injection
When browsing the internet, the security of the web applications we interact with is paramount to ensuring our personal information remains…
hack and bug bounty
Basic Linux Commands — Cybersecurity
Medium
Basic Linux Commands — Cybersecurity
Linux, as a versatile and powerful operating system, plays a critical role in the world of cybersecurity. Cybersecurity professionals and…
hack and bug bounty
Unleashing Sublist3r: The Ultimate Subdomain Enumeration Tool
Medium
Unleashing Sublist3r: The Ultimate Subdomain Enumeration Tool
In “Unlocking Subdomains: Harnessing the Power of Sublist3r for Website Enumeration,” dive into the world of subdomain enumeration with…
hack and bug bounty
Cracking the Code: jSQL Injection Unveils Server’s Hidden Database Secrets
Medium
Cracking the Code: jSQL Injection Unveils Server’s Hidden Database Secrets
Are you curious about discovering hidden information on a server? Look no further than “Unveiling Database Secrets with jSQL Injection”…
hack and bug bounty
PathFinder: Unveiling Website Secrets
Medium
PathFinder: Unveiling Website Secrets
Welcome to PathFinder: Unveiling Website Secrets! In this video, we will dive into the incredible features and capabilities of PathFinder…