hack and bug bounty
@hack_com
21
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
21 subscribers
hack and bug bounty
Mass Hunting XSS vulnerabilities
Medium
Mass Hunting XSS vulnerabilities
In this article, I would like to cover how it is possible to efficiently check thousands of endpoints for potential Cross Site Scripting…
hack and bug bounty
Default Credentials, P1 with $$$$ Reward in a Bug Bounty Program
Medium
Default Credentials, P1 with $$$$ Reward in a Bug Bounty Program
Somewhere in the world. November 2023
hack and bug bounty
IDOR “Insecure direct object references”, my first P1 in Bugbounty
Medium
IDOR “Insecure direct object references”, my first P1 in Bugbounty
First Whoami : Dris R. A Security Researcher, Penetration Tester from Paris ,France.
hack and bug bounty
Using cdk-nag with CDK pipelines
Medium
Using cdk-nag with CDK pipelines
Securing your CDK code by incorporating cdk-nag checks in CDK pipelines
hack and bug bounty
Securing Mobile Applications: Best Practices for a Mobile-First World
Medium
Securing Mobile Applications: Best Practices for a Mobile-First World
In the rapidly advancing realm of technology, mobile applications have become an integral part of our daily lives. From social networking…
hack and bug bounty
CSRF Bug Hunting Methodology: Intermediate
Medium
CSRF Bug Hunting Methodology: Intermediate
Want to uspkill in CSRF Hunting? If so, then this post is for you.
hack and bug bounty
Secure Web Application With Open ID Connect
Medium
Secure Web Application With Open ID Connect
Introduction: A secure Spring Boot and JSP application for booking vehicle services. Features Asgardeo OIDC for authentication.
hack and bug bounty
Website Scanner…
Medium
Website Scanner…
Hello Psychomong People. I am back with Website Scanner, I ve recieved queries on that How can we get the hyperlinks using python script…
hack and bug bounty
@pdiscoveryio’s Katana for Bug Bounty.
Medium
@pdiscoveryio’s Katana for Bug Bounty.
Katana is an incredibly built go-lang based web crawler which is a great stand alone reconnaissance tool, and also works perfectly in…
hack and bug bounty
1.8 Lab: Blind SQL injection with conditional errors | 2023
Medium
1.8 Lab: Blind SQL injection with conditional errors | 2023
This Application performs the same as the previous one. The results of the SQL query are not returned, and the application does not respond…
hack and bug bounty
Kaynak kodu ile XSS’i nasıl buldum ?
Medium
Kaynak kodu ile XSS’i nasıl buldum ?
Herkese merhaba ! Bir önceki yazıda IDOR ile Hesap Devralma Hikayemden bahsetmiştim .
hack and bug bounty
Ruby One — Bug Bounty Program & Claim Your $RUBY
Medium
Ruby One — Bug Bounty Program & Claim Your $RUBY
Click
👉
Ruby One to upgrade your crypto experience.
hack and bug bounty
HTTP/2 Request Smuggling
Medium
HTTP/2 Request Smuggling
This is a detailed introduction to HTTP/2 Request Smuggling and various methods of exploiting vulnerabilities. The case study uses…
hack and bug bounty
Unveiling Critical Bug Using Directory Search — Bug Bounty Tip!
Medium
Unveiling Critical Bug Using Directory Search — Bug Bounty Tip!
Directory search involves the systematic exploration of a web application’s file structure to uncover hidden paths, files, or directories…
hack and bug bounty
Confounding Adversaries Through the Art of Illusion
Medium
Confounding Adversaries Through the Art of Illusion
The use of deceptive environments, where organizations create fake assets and data to confound and mislead attackers. This proactive…
hack and bug bounty
Burpsuite Custom Scan Profiles
Medium
Burpsuite Custom Scan Profiles
Enhance Your Web Application Security Testing
hack and bug bounty
Understanding XML External Entity (XXE) Vulnerabilities
Medium
Understanding XML External Entity (XXE) Vulnerabilities
In the intricate realm of web vulnerabilities, XML External Entity (XXE) Injection stands as a silent predator, capable of infiltrating web…
hack and bug bounty
What is a DNS Zone Transfer Attack and How to Test It?
Medium
What is a DNS Zone Transfer Attack and How to Test It? [EN]
Zone Transfer, which is often used in large organizations and is especially important for multiple DNS servers, can cause a serious…
hack and bug bounty
How to obfuscate URL/form data parameters to bypass WAF for SQL injections?
Medium
How to obfuscate URL/form data parameters to bypass WAF for SQL injections?
Disclaimer: This information is meant for learning purposes only. We strongly discourage any illegal activities, including unauthorized…
hack and bug bounty
5+All Security Resource Digest for 2023–11–27
Medium
5+All Security Resource Digest for 2023–11–27
Here are my favorite 5 security resources added to my security resource database since yesterday. These resources will range from blogs and Reddit posts, through paid resource subscriptions and…