hack and bug bounty
@hack_com
21
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
21 subscribers
hack and bug bounty
Critical Security Flaws Found in NGINX Ingress Controller for Kubernetes
Medium
Critical Security Flaws Found in NGINX Ingress Controller for Kubernetes
Three high-severity security vulnerabilities have been exposed in the NGINX Ingress controller for Kubernetes, which pose a risk of secret credential theft. The vulnerabilities include:
—…
hack and bug bounty
HackTheBox-Keeper(WriteUp)
Medium
HackTheBox-Keeper(WriteUp)
Hello Lovely People! How’s everything going? I hope everything great. So, back with another one. Let’s Go!
hack and bug bounty
The first encounter: a hacking laboratory
Medium
The first encounter: a hacking laboratory
How to start testing tools and methods of Ethical Hacking.
hack and bug bounty
Mass Hunting XSS vulnerabilities
Medium
Mass Hunting XSS vulnerabilities
In this article, I would like to cover how it is possible to efficiently check thousands of endpoints for potential Cross Site Scripting…
hack and bug bounty
Default Credentials, P1 with $$$$ Reward in a Bug Bounty Program
Medium
Default Credentials, P1 with $$$$ Reward in a Bug Bounty Program
Somewhere in the world. November 2023
hack and bug bounty
IDOR “Insecure direct object references”, my first P1 in Bugbounty
Medium
IDOR “Insecure direct object references”, my first P1 in Bugbounty
First Whoami : Dris R. A Security Researcher, Penetration Tester from Paris ,France.
hack and bug bounty
Using cdk-nag with CDK pipelines
Medium
Using cdk-nag with CDK pipelines
Securing your CDK code by incorporating cdk-nag checks in CDK pipelines
hack and bug bounty
Securing Mobile Applications: Best Practices for a Mobile-First World
Medium
Securing Mobile Applications: Best Practices for a Mobile-First World
In the rapidly advancing realm of technology, mobile applications have become an integral part of our daily lives. From social networking…
hack and bug bounty
CSRF Bug Hunting Methodology: Intermediate
Medium
CSRF Bug Hunting Methodology: Intermediate
Want to uspkill in CSRF Hunting? If so, then this post is for you.
hack and bug bounty
Secure Web Application With Open ID Connect
Medium
Secure Web Application With Open ID Connect
Introduction: A secure Spring Boot and JSP application for booking vehicle services. Features Asgardeo OIDC for authentication.
hack and bug bounty
Website Scanner…
Medium
Website Scanner…
Hello Psychomong People. I am back with Website Scanner, I ve recieved queries on that How can we get the hyperlinks using python script…
hack and bug bounty
@pdiscoveryio’s Katana for Bug Bounty.
Medium
@pdiscoveryio’s Katana for Bug Bounty.
Katana is an incredibly built go-lang based web crawler which is a great stand alone reconnaissance tool, and also works perfectly in…
hack and bug bounty
1.8 Lab: Blind SQL injection with conditional errors | 2023
Medium
1.8 Lab: Blind SQL injection with conditional errors | 2023
This Application performs the same as the previous one. The results of the SQL query are not returned, and the application does not respond…
hack and bug bounty
Kaynak kodu ile XSS’i nasıl buldum ?
Medium
Kaynak kodu ile XSS’i nasıl buldum ?
Herkese merhaba ! Bir önceki yazıda IDOR ile Hesap Devralma Hikayemden bahsetmiştim .
hack and bug bounty
Ruby One — Bug Bounty Program & Claim Your $RUBY
Medium
Ruby One — Bug Bounty Program & Claim Your $RUBY
Click
👉
Ruby One to upgrade your crypto experience.
hack and bug bounty
HTTP/2 Request Smuggling
Medium
HTTP/2 Request Smuggling
This is a detailed introduction to HTTP/2 Request Smuggling and various methods of exploiting vulnerabilities. The case study uses…
hack and bug bounty
Unveiling Critical Bug Using Directory Search — Bug Bounty Tip!
Medium
Unveiling Critical Bug Using Directory Search — Bug Bounty Tip!
Directory search involves the systematic exploration of a web application’s file structure to uncover hidden paths, files, or directories…
hack and bug bounty
Confounding Adversaries Through the Art of Illusion
Medium
Confounding Adversaries Through the Art of Illusion
The use of deceptive environments, where organizations create fake assets and data to confound and mislead attackers. This proactive…
hack and bug bounty
Burpsuite Custom Scan Profiles
Medium
Burpsuite Custom Scan Profiles
Enhance Your Web Application Security Testing
hack and bug bounty
Understanding XML External Entity (XXE) Vulnerabilities
Medium
Understanding XML External Entity (XXE) Vulnerabilities
In the intricate realm of web vulnerabilities, XML External Entity (XXE) Injection stands as a silent predator, capable of infiltrating web…