hack and bug bounty
@hack_com
21
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
21 subscribers
hack and bug bounty
Web3 Vulnerabilities: Know The Exploit And Solution
Medium
Web3 Vulnerabilities: Know The Exploit And Solution
Hello guys i am vinay sati bug bounty hunter , Forensic Investigator and web3 Tester , just like a cyber all rounder
😂
hack and bug bounty
Elon Musk’s Twitter Takeover: A Year of Controversies, Devaluation, and User Exodus
Medium
Elon Musk’s Twitter Takeover: A Year of Controversies, Devaluation, and User Exodus
Explore the aftermath of Elon Musk’s Twitter takeover, uncovering the controversial decisions that led to a 55% value decrease. Discover…
hack and bug bounty
OverTheWire: Natas Writeup
Medium
OverTheWire: Natas Writeup
Natas teaches the basics of serverside web-security.
hack and bug bounty
What is Kerberoasting?? How it works.
Medium
What is Kerberoasting?? How it works.
Kerberoasting is a technique used in the field of cybersecurity, specifically in the context of attacking Microsoft Active Directory (AD)…
hack and bug bounty
TryHackMe-GamingServer(WriteUp)
Medium
TryHackMe-GamingServer(WriteUp)
Greeting Everyone! I hope you’re all doing great. Another one in the writeups list. Let’s Go.
hack and bug bounty
SUNSET:MIDNIGHT WALKTHROUGH PROVING GROUNDS
Medium
SUNSET:MIDNIGHT WALKTHROUGH PROVING GROUNDS
1)RECONNAISSANCE
hack and bug bounty
The Curious Case of Recursive ZIP Compression: Gmail’s Security Quirk
Medium
The Curious Case of Recursive ZIP Compression: Gmail’s Security Quirk
This exploration highlights a certain limitation within Gmail’s attachment handling system.
hack and bug bounty
AI and machine learning is going to change entire future
Medium
AI and machine learning is going to change entire future
If it is dealing with emergencies or diseases or development in business |Cyber security|
hack and bug bounty
How to Integrate Social Logins the Right Way
Medium
How to Integrate Social Logins the Right Way
A guide to creating a solution that avoids security pitfalls, scales well to many components, and is easily extendable
hack and bug bounty
Unmasking the Shadows: Ethical Hacking and the Art of Kerberos Roasting
Medium
Unmasking the Shadows: Ethical Hacking and the Art of Kerberos Roasting
Introduction: In the ever-evolving landscape of cybersecurity, ethical hacking has emerged as a formidable force against the dark arts of…
hack and bug bounty
Application Security Testing Market, Global Outlook and Forecast 2023–2032
Medium
Application Security Testing Market, Global Outlook and Forecast 2023–2032
The global Application Security Testing market was valued at US$ 3164 million in 2022 and is projected to reach US$ 5782.4 million by 2029…
hack and bug bounty
Vem Pedra #01 — SAST e SCA
Medium
Vem Pedra #01 — SAST e SCA
O mundo de application security é muito vasto, mas dentro dessa área dois tópicos são realmente muito importante e podemos dizer que são…
hack and bug bounty
Authentication Vulnerabilities- Lab #1 Username enumeration via different responses
Medium
Authentication Vulnerabilities- Lab #1 Username enumeration via different responses
For any correction / query /suggestion contact on Twitter(X) dollarboysushil My social medial handle Instagram dollarboysushil Twitter (X)…
hack and bug bounty
IWCON2023 Happening on 16–17 December 2023
Medium
IWCON2023 Happening on 16–17 December 2023
Book your seats today!
hack and bug bounty
Revealing True Industry Potential Through the Ultimate Web3 Security Ecosystem: R.xyz
Medium
Revealing True Industry Potential Through the Ultimate Web3 Security Ecosystem: R.xyz
In this article, we will explore the importance of bug bounty programs and smart contract audits!
hack and bug bounty
Perpetual Protocol Bounty Program Review
Medium
Perpetual Protocol Bounty Program Review
6 months ago the Perpetual DAO launched a security entity to ensure funding for the ongoing work being done by the team, external auditors…
hack and bug bounty
5+All Security Resource Digest for 2023–11–10
Medium
5+All Security Resource Digest for 2023–11–10
Here are my favorite 5 security resources added to my security resource database since yesterday. These resources will range from blogs and Reddit posts, through paid resource subscriptions and…
hack and bug bounty
Intrusion Detection And Prevention System
Medium
Intrusion Detection And Prevention System
IDS(Intrusion Detection System) and IPS(Intrusion Prevention System) are both systems used for monitoring events in a computer systems or…
hack and bug bounty
Authentication Vulnerabilities- Lab #2 2FA simple bypass
Medium
Authentication Vulnerabilities- Lab #2 2FA simple bypass
For any correction / query /suggestion contact on Twitter(X) dollarboysushil My social medial handle Instagram dollarboysushil Twitter (X)…
hack and bug bounty
Authentication Vulnerabilities- Lab #3 Password reset broken logic
Medium
Authentication Vulnerabilities- Lab #3 Password reset broken logic
For any correction / query /suggestion contact on Twitter(X) dollarboysushil My social medial handle Instagram dollarboysushil Twitter (X)…