hack and bug bounty
@hack_com
21
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
21 subscribers
hack and bug bounty
Enumerate DNS
Medium
Enumerate DNS
Imagine the internet as a vast network of roads and paths connecting billions of devices worldwide. To navigate this network, we use domain…
hack and bug bounty
A detailed and informative article on the importance of penetration testing for APIs.
Medium
A detailed and informative article on the importance of penetration testing for APIs.
A detailed and informative article on the importance of penetration testing for APIs.
🔐
Your expertise in cybersecurity shines through, providing valuable insights into protecting digital assets. This is a must-read for anyone looking to enhance their security…
hack and bug bounty
I hacked IIT Bombay’s website. Here’s exactly how I did it.
Medium
I hacked IIT Bombay’s website. Here’s exactly how I did it.
I found vulnerabilities in Moodi and Techfest’s website.
hack and bug bounty
my upload, x
Medium
my upload, x
hack and bug bounty
The Dark Web: Unveiling the Hidden Side of the Internet
Medium
The Dark Web: Unveiling the Hidden Side of the Internet
The internet is a vast, interconnected network that most of us use daily for communication, information, and entertainment. But lurking…
hack and bug bounty
Power of Twitter: The Next Frontier for Emerging Artists
Medium
Power of Twitter: The Next Frontier for Emerging Artists
https://twitter.com/0mn1Dot
hack and bug bounty
Authentication Vulnerabilities- Lab #9 Brute-forcing a stay-logged-in cookie
Medium
Authentication Vulnerabilities- Lab #9 Brute-forcing a stay-logged-in cookie
For any correction / query /suggestion contact on Instagram dollarboysushil Twitter (X) dollarboysushil Youtube dollarboysushil
hack and bug bounty
The Best Penetration Testing Services in US — Meet Allendevaux & Company
Medium
The Best Penetration Testing Services in US — Meet Allendevaux & Company
Organizations are experiencing increasing security threats with the advancements of cloud storage, bring-your-own-devices, and remote…
hack and bug bounty
Project 2510: Bug Bounty Challenge — Day 8/25
Medium
Project 2510: Bug Bounty Challenge — Day 8/25
Welcome to Day 8.
hack and bug bounty
Security Evaluation: eBPF vs. WebAssembly
Medium
Security Evaluation: eBPF vs. WebAssembly
As technology advances, secure and efficient execution environments become crucial. This post explores eBPF (extended Berkeley Packet…
hack and bug bounty
Securing Google Workspace — A Guide
Medium
Securing Google Workspace — A Guide
Google Workspace has become the de-facto collaboration suite of choice for many a startup, and for good reason. It’s easy to get started…
hack and bug bounty
The Basics of Ethical Hacking: Unveiling the Digital Guardians
Medium
The Basics of Ethical Hacking: Unveiling the Digital Guardians
Visit sudohackers.com and explore the Basics of Ethical Hacking. Become a Digital Guardian! Unveil the skills to secure, protect, and…
hack and bug bounty
Detection Engineering: Strengthening Cybersecurity Defense
Medium
Detection Engineering: Strengthening Cybersecurity Defense
Detection engineering has emerged as a crucial component in fortifying the defense mechanisms of organizations. Detection engineering…
hack and bug bounty
Navigating Email Privacy with SquareX’s Smart Integration for Gmail
Medium
Navigating Email Privacy with SquareX’s Smart Integration for Gmail
View emails without the sender knowing with ‘Enhanced Privacy Mode’
hack and bug bounty
Hackathon : KPU.GO.ID
Medium
Hackathon : KPU.GO.ID
Tujuan:
Tujuan dari kampanye pengujian penetrasi ini adalah untuk mengidentifikasi dan mendemonstrasikan kerentanan kritis dalam…
hack and bug bounty
Vulnhub_DC_9
Medium
Vulnhub_DC_9
In this article, I’m going to crack the DC-9 box of DC series in vulnhub.
hack and bug bounty
Introducing Bambdas
PortSwigger Blog
Introducing Bambdas
You've might have heard of Lambdas. But have you heard of Bambdas? They're a unique new way to customize Burp Suite directly from the UI, using only small snippets of Java. Changing the face of Burp S
hack and bug bounty
How to find probably vulnerable objects in your own surface with Netlas.io?
Medium
How to find probably vulnerable objects in your own surface with Netlas.io?
Quickly and easily check organization’s surface for vulnerabilities using Netlas.io.
hack and bug bounty
Pentest Tools: Precision in Penetration Testing Unleashed
Medium
Pentest Tools: Precision in Penetration Testing Unleashed
A Comprehensive Toolkit for Penetration Testing
hack and bug bounty
Dumping Android application memory with Fridump
Medium
Dumping Android application memory with Fridump
When dealing with Android applications that handle highly sensitive information, it is crucial to ensure that the application does not…