hack and bug bounty
@hack_com
21
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
21 subscribers
hack and bug bounty
I created posts on the newsletter page dedicated to the program administrator
Medium
I created posts on the newsletter page dedicated to the program administrator
Hello everyone ,
I’m Hossam Hamada, Today I would like to share with you one of my discoveries in HackerOne ’s program
hack and bug bounty
Affordable GNSS Solutions: UM980 and UM982 for Precise Positioning
Medium
Affordable GNSS Solutions: UM980 and UM982 for Precise Positioning
“Affordable GNSS Solutions: UM980 and UM982 for Precise Positioning” is published by SimeonOnSecurity.
hack and bug bounty
The Definitive Guide to Twitter Marketing in 2024
Medium
The Definitive Guide to Twitter Marketing in 2024
Trying to navigate the massive world of Twitter (X) marketing?
hack and bug bounty
Exploring the Android Play Store: A Comprehensive Guide to Publishing Your Application
Medium
Exploring the Android Play Store: A Comprehensive Guide to Publishing Your Application
Unveiling the Android Play Store: A Gateway to Millions
hack and bug bounty
Crafting XSS (Cross-Site Scripting) payloads
Medium
Crafting XSS (Cross-Site Scripting) payloads
Crafting XSS (Cross-Site Scripting) payloads is a significant aspect of learning about web application security, particularly for…
hack and bug bounty
Why Kali is Used For Ethical Hacking?
Medium
Why Kali is Used For Ethical Hacking?
If you want to know why it is used for Ethical hacking then (click here)
hack and bug bounty
“Unlocking the Gateway A Comprehensive Guide to OSCP Certification”
Medium
“Unlocking the Gateway A Comprehensive Guide to OSCP Certification”
In the dynamic field of cybersecurity, the Offensive Security Certified Professional (OSCP) certification stands out as a benchmark for…
hack and bug bounty
1200$ IDOR Flaw: Allow Attacker To Approve Project Time Tracking
Medium
1200$ IDOR Flaw: Allow Attacker To Approve Project Time Tracking
Discover the shocking Insecure Direct Object Reference (IDOR) vulnerability in ExamFit’s (Private Program) Time Tracking System, and see how an attacker could gain unauthorized access and approval of…
hack and bug bounty
Ethical Dilemmas on the Road: The Trolley Problem in Self-Driving Cars
Medium
Ethical Dilemmas on the Road: The Trolley Problem in Self-Driving Cars
The Streetcar Issue is a thought test in morals and moral way of thinking this is routinely used to find moral problems in conditions…
hack and bug bounty
Understanding The Zero Trust Cybersecurity Framework: A Paradigm Shift In Network And Data…
Medium
Understanding The Zero Trust Cybersecurity Framework: A Paradigm Shift In Network And Data…
In today’s digital landscape, where cyber threats are becoming increasingly sophisticated and prevalent, traditional security measures are…
hack and bug bounty
“OSCP vs. Other Cybersecurity Certifications Choosing the Right Path”
Medium
“OSCP vs. Other Cybersecurity Certifications Choosing the Right Path”
In the expansive realm of cybersecurity certifications, navigating the plethora of options can be daunting. The Offensive Security…
hack and bug bounty
PENETRATION TEST REPORT FOR KIOPTRIX
Medium
PENETRATION TEST REPORT FOR KIOPTRIX
Executive summary The penetration test was conducted to find and exploit the vulnerabilities in the Kioptrix VM and capture the flags within the VM.The purpose of these is to learn the basic tools…
hack and bug bounty
Revealing the Sneaky Hack: OOB SQL Injection and Its Real-world Discovery in My Daily Pentesting…
Medium
Revealing the Sneaky Hack: OOB SQL Injection and Its Real-world Discovery in My Daily Pentesting…
This article aims to demystify the complexities of OOB SQL injection
hack and bug bounty
SSRF (LAB)
Medium
SSRF (LAB)
Description
hack and bug bounty
22.1 Lab: JWT authentication bypass via unverified signature | 2023
Medium
22.1 Lab: JWT authentication bypass via unverified signature | 2023
This lab uses a JWT-based mechanism for handling sessions. Due to implementation flaws, the server doesn’t verify the signature of any JWTs…
hack and bug bounty
Authentication Vulnerabilities- Lab #8 2FA (Two Factor Authentication) broken logic
Medium
Authentication Vulnerabilities- Lab #8 2FA (Two Factor Authentication) broken logic
For any correction / query /suggestion contact on Instagram dollarboysushil Twitter (X) dollarboysushil Youtube dollarboysushil
hack and bug bounty
ICMP WALKTHROUGH PROVING GROUNDS
Medium
ICMP WALKTHROUGH PROVING GROUNDS
— — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — —
hack and bug bounty
Keep Track of Your Opposition Leader’s Instagram Activity
Medium
Keep Track of Your Opposition Leader’s Instagram Activity
In the fast-paced world of politics, keeping tabs on your opposition leader is crucial. Social media platforms, especially Instagram, offer…
hack and bug bounty
How to reset password in Kali Linux.
Medium
How to reset password in Kali Linux.
of bob218
hack and bug bounty
“Beyond the Basics Advanced Techniques for OSCP Preparation”
Medium
“Beyond the Basics Advanced Techniques for OSCP Preparation”
Preparing for the Offensive Security Certified Professional (OSCP) certification demands more than a foundational understanding of…