hack and bug bounty
@hack_com
21
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
21 subscribers
hack and bug bounty
Gaining a shell in Windows: PSEXEC
Medium
Gaining a shell in Windows: PSEXEC
hack and bug bounty
InfoSecSherpa’s News Roundup for Saturday, November 11, 2023
Medium
InfoSecSherpa’s News Roundup for Saturday, November 11, 2023
InfoSecSherpa: Your Guide Up a Mountain of Information!
hack and bug bounty
KIOPTRIX LEVEL 1
Medium
KIOPTRIX LEVEL 1
80 portunu kontrol ettim ama pek bir şey yoktu.
hack and bug bounty
I created posts on the newsletter page dedicated to the program administrator
Medium
I created posts on the newsletter page dedicated to the program administrator
Hello everyone ,
I’m Hossam Hamada, Today I would like to share with you one of my discoveries in HackerOne ’s program
hack and bug bounty
Affordable GNSS Solutions: UM980 and UM982 for Precise Positioning
Medium
Affordable GNSS Solutions: UM980 and UM982 for Precise Positioning
“Affordable GNSS Solutions: UM980 and UM982 for Precise Positioning” is published by SimeonOnSecurity.
hack and bug bounty
The Definitive Guide to Twitter Marketing in 2024
Medium
The Definitive Guide to Twitter Marketing in 2024
Trying to navigate the massive world of Twitter (X) marketing?
hack and bug bounty
Exploring the Android Play Store: A Comprehensive Guide to Publishing Your Application
Medium
Exploring the Android Play Store: A Comprehensive Guide to Publishing Your Application
Unveiling the Android Play Store: A Gateway to Millions
hack and bug bounty
Crafting XSS (Cross-Site Scripting) payloads
Medium
Crafting XSS (Cross-Site Scripting) payloads
Crafting XSS (Cross-Site Scripting) payloads is a significant aspect of learning about web application security, particularly for…
hack and bug bounty
Why Kali is Used For Ethical Hacking?
Medium
Why Kali is Used For Ethical Hacking?
If you want to know why it is used for Ethical hacking then (click here)
hack and bug bounty
“Unlocking the Gateway A Comprehensive Guide to OSCP Certification”
Medium
“Unlocking the Gateway A Comprehensive Guide to OSCP Certification”
In the dynamic field of cybersecurity, the Offensive Security Certified Professional (OSCP) certification stands out as a benchmark for…
hack and bug bounty
1200$ IDOR Flaw: Allow Attacker To Approve Project Time Tracking
Medium
1200$ IDOR Flaw: Allow Attacker To Approve Project Time Tracking
Discover the shocking Insecure Direct Object Reference (IDOR) vulnerability in ExamFit’s (Private Program) Time Tracking System, and see how an attacker could gain unauthorized access and approval of…
hack and bug bounty
Ethical Dilemmas on the Road: The Trolley Problem in Self-Driving Cars
Medium
Ethical Dilemmas on the Road: The Trolley Problem in Self-Driving Cars
The Streetcar Issue is a thought test in morals and moral way of thinking this is routinely used to find moral problems in conditions…
hack and bug bounty
Understanding The Zero Trust Cybersecurity Framework: A Paradigm Shift In Network And Data…
Medium
Understanding The Zero Trust Cybersecurity Framework: A Paradigm Shift In Network And Data…
In today’s digital landscape, where cyber threats are becoming increasingly sophisticated and prevalent, traditional security measures are…
hack and bug bounty
“OSCP vs. Other Cybersecurity Certifications Choosing the Right Path”
Medium
“OSCP vs. Other Cybersecurity Certifications Choosing the Right Path”
In the expansive realm of cybersecurity certifications, navigating the plethora of options can be daunting. The Offensive Security…
hack and bug bounty
PENETRATION TEST REPORT FOR KIOPTRIX
Medium
PENETRATION TEST REPORT FOR KIOPTRIX
Executive summary The penetration test was conducted to find and exploit the vulnerabilities in the Kioptrix VM and capture the flags within the VM.The purpose of these is to learn the basic tools…
hack and bug bounty
Revealing the Sneaky Hack: OOB SQL Injection and Its Real-world Discovery in My Daily Pentesting…
Medium
Revealing the Sneaky Hack: OOB SQL Injection and Its Real-world Discovery in My Daily Pentesting…
This article aims to demystify the complexities of OOB SQL injection
hack and bug bounty
SSRF (LAB)
Medium
SSRF (LAB)
Description
hack and bug bounty
22.1 Lab: JWT authentication bypass via unverified signature | 2023
Medium
22.1 Lab: JWT authentication bypass via unverified signature | 2023
This lab uses a JWT-based mechanism for handling sessions. Due to implementation flaws, the server doesn’t verify the signature of any JWTs…
hack and bug bounty
Authentication Vulnerabilities- Lab #8 2FA (Two Factor Authentication) broken logic
Medium
Authentication Vulnerabilities- Lab #8 2FA (Two Factor Authentication) broken logic
For any correction / query /suggestion contact on Instagram dollarboysushil Twitter (X) dollarboysushil Youtube dollarboysushil
hack and bug bounty
ICMP WALKTHROUGH PROVING GROUNDS
Medium
ICMP WALKTHROUGH PROVING GROUNDS
— — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — —