hack and bug bounty
@hack_com
21
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
21 subscribers
hack and bug bounty
Elon Musk’s X Formally Know As Twitter Is Going Down Hill
Medium
Elon Musk’s X Formally Know As Twitter Is Going Down Hill
Elon Musk’s X company has been facing a challenging period recently, with financial losses affecting its overall performance. Despite his…
hack and bug bounty
SAML Hacking 101
Medium
SAML Hacking 101
Tips and tricks for hacking SAML SSO applications.
hack and bug bounty
How to investigate a Phishing Email? A step by step guide !
Medium
How to investigate a Phishing Email? A step by step guide !
Phishing emails are a common and dangerous form of cyber-attack that aims to deceive individuals into revealing sensitive information or…
hack and bug bounty
Hacker’s Tools of the Trade: Nmap
Medium
Hacker’s Tools of the Trade: Nmap
Want to know the first step of enumerating a network? This is part one of my series on tools I use while hacking.
hack and bug bounty
Unveiling the Best GPS Antennas: Optimize Onocoy & Geodnet Earnings!
Medium
Unveiling the Best GPS Antennas: Optimize Onocoy & Geodnet Earnings!
hack and bug bounty
Web3 Vulnerabilities: Know The Exploit And Solution
Medium
Web3 Vulnerabilities: Know The Exploit And Solution
Hello guys i am vinay sati bug bounty hunter , Forensic Investigator and web3 Tester , just like a cyber all rounder
😂
hack and bug bounty
Elon Musk’s Twitter Takeover: A Year of Controversies, Devaluation, and User Exodus
Medium
Elon Musk’s Twitter Takeover: A Year of Controversies, Devaluation, and User Exodus
Explore the aftermath of Elon Musk’s Twitter takeover, uncovering the controversial decisions that led to a 55% value decrease. Discover…
hack and bug bounty
OverTheWire: Natas Writeup
Medium
OverTheWire: Natas Writeup
Natas teaches the basics of serverside web-security.
hack and bug bounty
What is Kerberoasting?? How it works.
Medium
What is Kerberoasting?? How it works.
Kerberoasting is a technique used in the field of cybersecurity, specifically in the context of attacking Microsoft Active Directory (AD)…
hack and bug bounty
TryHackMe-GamingServer(WriteUp)
Medium
TryHackMe-GamingServer(WriteUp)
Greeting Everyone! I hope you’re all doing great. Another one in the writeups list. Let’s Go.
hack and bug bounty
SUNSET:MIDNIGHT WALKTHROUGH PROVING GROUNDS
Medium
SUNSET:MIDNIGHT WALKTHROUGH PROVING GROUNDS
1)RECONNAISSANCE
hack and bug bounty
The Curious Case of Recursive ZIP Compression: Gmail’s Security Quirk
Medium
The Curious Case of Recursive ZIP Compression: Gmail’s Security Quirk
This exploration highlights a certain limitation within Gmail’s attachment handling system.
hack and bug bounty
AI and machine learning is going to change entire future
Medium
AI and machine learning is going to change entire future
If it is dealing with emergencies or diseases or development in business |Cyber security|
hack and bug bounty
How to Integrate Social Logins the Right Way
Medium
How to Integrate Social Logins the Right Way
A guide to creating a solution that avoids security pitfalls, scales well to many components, and is easily extendable
hack and bug bounty
Unmasking the Shadows: Ethical Hacking and the Art of Kerberos Roasting
Medium
Unmasking the Shadows: Ethical Hacking and the Art of Kerberos Roasting
Introduction: In the ever-evolving landscape of cybersecurity, ethical hacking has emerged as a formidable force against the dark arts of…
hack and bug bounty
Application Security Testing Market, Global Outlook and Forecast 2023–2032
Medium
Application Security Testing Market, Global Outlook and Forecast 2023–2032
The global Application Security Testing market was valued at US$ 3164 million in 2022 and is projected to reach US$ 5782.4 million by 2029…
hack and bug bounty
Vem Pedra #01 — SAST e SCA
Medium
Vem Pedra #01 — SAST e SCA
O mundo de application security é muito vasto, mas dentro dessa área dois tópicos são realmente muito importante e podemos dizer que são…
hack and bug bounty
Authentication Vulnerabilities- Lab #1 Username enumeration via different responses
Medium
Authentication Vulnerabilities- Lab #1 Username enumeration via different responses
For any correction / query /suggestion contact on Twitter(X) dollarboysushil My social medial handle Instagram dollarboysushil Twitter (X)…
hack and bug bounty
IWCON2023 Happening on 16–17 December 2023
Medium
IWCON2023 Happening on 16–17 December 2023
Book your seats today!
hack and bug bounty
Revealing True Industry Potential Through the Ultimate Web3 Security Ecosystem: R.xyz
Medium
Revealing True Industry Potential Through the Ultimate Web3 Security Ecosystem: R.xyz
In this article, we will explore the importance of bug bounty programs and smart contract audits!