hack and bug bounty
@hack_com
21
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
21 subscribers
hack and bug bounty
Analytical Methodology in InfoSec
Medium
Analytical Methodology in InfoSec
A brief primer on analysis and detection
hack and bug bounty
Endpoint Security: The First Line of Defence in Your Digital Strategy
Medium
Endpoint Security: The First Line of Defence in Your Digital Strategy
In an era where cyber threats are increasingly sophisticated, endpoint security has emerged as a crucial element in safeguarding business…
hack and bug bounty
HackerOne Surpasses $300 Million in Rewards for Ethical Hackers
Medium
HackerOne Surpasses $300 Million in Rewards for Ethical Hackers
HackerOne, a pioneer in bug bounty platforms, proudly announces crossing the $300 million mark in awards for ethical hackers and vulnerability researchers. This milestone comes as thirty hackers have…
hack and bug bounty
DNS C2 — When Malware Goes Incognito!
Medium
DNS C2 — When Malware Goes Incognito!
DNS (Domain Name System) Command and Control (C2) refers to a technique used by malware authors and attackers to establish communication…
hack and bug bounty
Critical Security Flaws Found in NGINX Ingress Controller for Kubernetes
Medium
Critical Security Flaws Found in NGINX Ingress Controller for Kubernetes
Three high-severity security vulnerabilities have been exposed in the NGINX Ingress controller for Kubernetes, which pose a risk of secret credential theft. The vulnerabilities include:
—…
hack and bug bounty
HackTheBox-Keeper(WriteUp)
Medium
HackTheBox-Keeper(WriteUp)
Hello Lovely People! How’s everything going? I hope everything great. So, back with another one. Let’s Go!
hack and bug bounty
The first encounter: a hacking laboratory
Medium
The first encounter: a hacking laboratory
How to start testing tools and methods of Ethical Hacking.
hack and bug bounty
Mass Hunting XSS vulnerabilities
Medium
Mass Hunting XSS vulnerabilities
In this article, I would like to cover how it is possible to efficiently check thousands of endpoints for potential Cross Site Scripting…
hack and bug bounty
Default Credentials, P1 with $$$$ Reward in a Bug Bounty Program
Medium
Default Credentials, P1 with $$$$ Reward in a Bug Bounty Program
Somewhere in the world. November 2023
hack and bug bounty
IDOR “Insecure direct object references”, my first P1 in Bugbounty
Medium
IDOR “Insecure direct object references”, my first P1 in Bugbounty
First Whoami : Dris R. A Security Researcher, Penetration Tester from Paris ,France.
hack and bug bounty
Using cdk-nag with CDK pipelines
Medium
Using cdk-nag with CDK pipelines
Securing your CDK code by incorporating cdk-nag checks in CDK pipelines
hack and bug bounty
Securing Mobile Applications: Best Practices for a Mobile-First World
Medium
Securing Mobile Applications: Best Practices for a Mobile-First World
In the rapidly advancing realm of technology, mobile applications have become an integral part of our daily lives. From social networking…
hack and bug bounty
CSRF Bug Hunting Methodology: Intermediate
Medium
CSRF Bug Hunting Methodology: Intermediate
Want to uspkill in CSRF Hunting? If so, then this post is for you.
hack and bug bounty
Secure Web Application With Open ID Connect
Medium
Secure Web Application With Open ID Connect
Introduction: A secure Spring Boot and JSP application for booking vehicle services. Features Asgardeo OIDC for authentication.
hack and bug bounty
Website Scanner…
Medium
Website Scanner…
Hello Psychomong People. I am back with Website Scanner, I ve recieved queries on that How can we get the hyperlinks using python script…
hack and bug bounty
@pdiscoveryio’s Katana for Bug Bounty.
Medium
@pdiscoveryio’s Katana for Bug Bounty.
Katana is an incredibly built go-lang based web crawler which is a great stand alone reconnaissance tool, and also works perfectly in…
hack and bug bounty
1.8 Lab: Blind SQL injection with conditional errors | 2023
Medium
1.8 Lab: Blind SQL injection with conditional errors | 2023
This Application performs the same as the previous one. The results of the SQL query are not returned, and the application does not respond…
hack and bug bounty
Kaynak kodu ile XSS’i nasıl buldum ?
Medium
Kaynak kodu ile XSS’i nasıl buldum ?
Herkese merhaba ! Bir önceki yazıda IDOR ile Hesap Devralma Hikayemden bahsetmiştim .
hack and bug bounty
Ruby One — Bug Bounty Program & Claim Your $RUBY
Medium
Ruby One — Bug Bounty Program & Claim Your $RUBY
Click
👉
Ruby One to upgrade your crypto experience.
hack and bug bounty
HTTP/2 Request Smuggling
Medium
HTTP/2 Request Smuggling
This is a detailed introduction to HTTP/2 Request Smuggling and various methods of exploiting vulnerabilities. The case study uses…