hack and bug bounty
@hack_com
21
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
21 subscribers
hack and bug bounty
InfoSecSherpa’s News Roundup for Friday, November 10, 2023
Medium
InfoSecSherpa’s News Roundup for Friday, November 10, 2023
InfoSecSherpa: Your Guide Up a Mountain of Information!
hack and bug bounty
Streamlining Acceptance Criteria for Secure Agile Development
Medium
Streamlining Acceptance Criteria for Secure Agile Development
Clear and concise acceptance criteria are essential for secure Agile software development in a Secure Software Factory. They ensure user…
hack and bug bounty
Geodnet MobileCM UM980 Upgrade & Alternative Mini-PCIe Cards
Medium
Geodnet MobileCM UM980 Upgrade & Alternative Mini-PCIe Cards
“Geodnet MobileCM UM980 Upgrade & Alternative Mini-PCIe Cards” is published by SimeonOnSecurity.
hack and bug bounty
PortSwigger Web Academy: Stealing OAuth Tokens Via Open Redirect
Medium
PortSwigger Web Academy: Stealing OAuth Tokens Via Open Redirect
Vulnerability Chaining for Account Takeover
hack and bug bounty
What is ARP (Address Resolution Protocol)
Medium
What is ARP (Address Resolution Protocol)
Imagine you’re in a big classroom, and each student has a unique name (like an IP address) and a student ID card (like a MAC address). Now…
hack and bug bounty
What is Nmap
Medium
What is Nmap
Let’s imagine you have a super cool detective tool called Nmap. This tool helps you explore and understand the devices (like computers and…
hack and bug bounty
Introduction to API Hacking: A Free Course to Level Up Your Skills
Medium
Introduction to API Hacking: A Free Course to Level Up Your Skills
Learn API Hacking for FREE from Zero-to-Hero
hack and bug bounty
Authentication Vulnerabilities- Lab #4 Username enumeration via subtly different responses
Medium
Authentication Vulnerabilities- Lab #4 Username enumeration via subtly different responses
For any correction / query /suggestion contact on Instagram dollarboysushil Twitter (X) dollarboysushil Youtube dollarboysushil
hack and bug bounty
BACHELOR OF ETHICAL HACKING | ASSIGNMENT, HOMEWORK HELP | ABERTAY UNIVERSITY UK
Medium
BACHELOR OF ETHICAL HACKING | ASSIGNMENT, HOMEWORK HELP | ABERTAY UNIVERSITY UK
Ethical hacking is the practice of testing and evaluating the security of computer systems and networks by mimicking the actions of…
hack and bug bounty
API Security in AppSec
Medium
API Security in AppSec
API security is crucial in Application Security for several reasons:
hack and bug bounty
ADSB SDR Adapter Performance in Flight Tracking: Key Insights and Comparisons
Medium
ADSB SDR Adapter Performance in Flight Tracking: Key Insights and Comparisons
“ADSB SDR Adapter Performance in Flight Tracking: Key Insights and Comparisons” is published by SimeonOnSecurity.
hack and bug bounty
Bypassing 2FA for Password Reset : By Request Manipulation 500$ Bug
Medium
Bypassing 2FA for Password Reset : By Request Manipulation 500$ Bug
Explore a real-world account security threat — a 2FA bypass vulnerability. Learn how this flaw allows unauthorized access.
hack and bug bounty
Top 5 Free Online Labs to Hone Your Bug Bounty Skills
Medium
Top 5 Free Online Labs to Hone Your Bug Bounty Skills
Diving into the realm of bug bounty hunting requires not just theoretical knowledge but practical experience too. While reading about…
hack and bug bounty
Quantum Cryptography:-Your Digital Guardian in a Cosmic Dance
Medium
Quantum Cryptography:-Your Digital Guardian in a Cosmic Dance
Hey there, fellow digital explorers! Today, let’s dive into the wild world of Quantum Cryptography — where the magic of quantum physics…
hack and bug bounty
Subdomain takeover and Text injection on a 404 error page-$100 bounty
Medium
Subdomain takeover and Text injection on a 404 error page-$100 bounty
Hello everyone! I’m Jeewan Bhatta and I am here with my first hackerone bug write-up. Hope you all are doing great. So now I am gonna tell…
hack and bug bounty
Attention Cyber Enthusiasts! Exciting News Ahead! ️
Medium
🔍
🐞
Attention Cyber Enthusiasts! Exciting News Ahead!
🚀
🛡️
Hey, fellow code hunters!
🕵️♂️
💻
hack and bug bounty
Windows Privilege Escalation : AlwaysInstallElevated
Medium
Windows Privilege Escalation : AlwaysInstallElevated
AlwaysInstallElevated, when set to true, grants applications elevated privileges during installation, enabling them to make system-wide…
hack and bug bounty
Abusing services using SVG files: Part 1. Anatomy of an svg
Medium
Abusing services using SVG files: Part 1. Anatomy of an svg
This is a 4 part series based on a vulnerability I wrote a detailed, step-by-step exploitation instructions in an internal comms channel. I…
hack and bug bounty
“The Marriage of Data Science and IoT A Technological Symphony”
Medium
“The Marriage of Data Science and IoT A Technological Symphony”
In the age of interconnected devices and boundless data, the convergence of Data Science and the Internet of Things (IoT) is giving rise to…
hack and bug bounty
“Climate Change Modeling Using Data Science to Save the Planet”
Medium
“Climate Change Modeling Using Data Science to Save the Planet”
As the specter of climate change looms over our planet, the urgency to understand and mitigate its impact has never been greater. In this…