hack and bug bounty
@hack_com
21
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
21 subscribers
hack and bug bounty
“Ethical Hacking in the Cloud Securing Virtual Spaces”
Medium
“Ethical Hacking in the Cloud Securing Virtual Spaces”
As organizations rapidly migrate their infrastructure to the cloud, the need for robust cybersecurity measures becomes paramount. Ethical…
hack and bug bounty
“The Legal Side of Ethical Hacking Navigating Ethical Boundaries”
Medium
“The Legal Side of Ethical Hacking Navigating Ethical Boundaries”
In the realm of cybersecurity, ethical hacking plays a crucial role in identifying and addressing vulnerabilities before malicious actors…
hack and bug bounty
Exploring WebExtension security vulnerabilities in React Developer Tools and Vue.js devtools
Medium
Exploring WebExtension security vulnerabilities in React Developer Tools and Vue.js devtools
Snyk’s security researchers have conducted some research to better understand the risks of WebExtensions, both well-known (i.e. XSS, code injection) and those more specific to WebExtensions…
hack and bug bounty
Exploring WebExtension security vulnerabilities in React Developer Tools and Vue.js devtools
Medium
Exploring WebExtension security vulnerabilities in React Developer Tools and Vue.js devtools
Snyk’s security researchers have conducted some research to better understand the risks of WebExtensions, both well-known (i.e. XSS, code injection) and those more specific to WebExtensions…
hack and bug bounty
XSS - Weaponization ATO
Medium
XSS - Weaponization ATO
Hi fellow hunters, In this write-up I will detail the discovery of a reflected cross-site scripting bug and the subsequent escalation that…
hack and bug bounty
PASTA Framework Explained | Threat Modeling | TryHackMe
Medium
PASTA Framework Explained | Threat Modeling | TryHackMe
We covered the PASTA (Process for Attack Simulation and Threat Analysis) framework for risk assessment and threat modeling. We explained…
hack and bug bounty
Kelltron Access Management
Medium
Kelltron Access Management
Discover the power of Kelltron Access Management! We provide a seamless solution for centralizing application roles, accounts, and critical…
hack and bug bounty
How to Become an Ethical Hacker: A 10-Step Learn Guide | Careervira
Medium
How to Become an Ethical Hacker: A 10-Step Learn Guide | Careervira
In this 10-step learn guide get the best and most simplified roadmap to becoming a successful ethical hacker.
hack and bug bounty
1.9 Lab: Visible error-based SQL injection | 2023
Medium
1.9 Lab: Visible error-based SQL injection | 2023
This lab contains a SQL injection vulnerability. The application uses a tracking cookie for analytics and performs a SQL query containing…
hack and bug bounty
VulnLab — SQLi Injection series — Bypass Login
Medium
VulnLab — SQLi Injection series — Bypass Login
Hola, udah lama gak nulis tentang cyber security, kali ini gue mau sharing tentang contoh kasus SQLi yang simpel but deadly, yaitu bypass…
hack and bug bounty
5+All Security Resource Digest for 2023–11–28
Medium
5+All Security Resource Digest for 2023–11–28
Here are my favorite 5 security resources added to my security resource database since yesterday. These resources will range from blogs and Reddit posts, through paid resource subscriptions and…
hack and bug bounty
Zero-Day Vulnerabilities: Decrypting the Threat Landscape with VAPT
Medium
Zero-Day Vulnerabilities: Decrypting the Threat Landscape with VAPT
Zero-Day Vulnerabilities and VAPT: Understanding the challenges of zero-day threats and how VAPT services can mitigate their impact.
hack and bug bounty
A Graduate Student Journey to Ethical Hacking
Medium
A Graduate Student Journey to Ethical Hacking
From student to cyber security professional
hack and bug bounty
Detection Engineering — False Positives, False Negatives and Mis-Detections
Medium
Detection Engineering — False Positives, False Negatives and Mis-Detections
Detection engineering isn’t just stopping badness. Unfortunately, false positives and false negatives, as well as mis-detections…
hack and bug bounty
Unlocking the Power of Kali Linux: Resetting Passwords with Command Line Mastery
Medium
Unlocking the Power of Kali Linux: Resetting Passwords with Command Line Mastery
Kali Linux, a powerful and versatile penetration testing distribution, is a go-to choice for security professionals and enthusiasts alike…
hack and bug bounty
Cybersecurity and the Future Outlook
Medium
Cybersecurity and the Future Outlook
The history of cybersecurity dates back to the early days of computing when the focus was primarily on protecting hardware and physical…
hack and bug bounty
Cyber Briefing: 2023.11.28
Medium
Cyber Briefing: 2023.11.28
👉
What’s the latest in the cyber world today?
hack and bug bounty
The Bug Hunter’s Methodology Live Course Review
Medium
The Bug Hunter’s Methodology Live Course Review
I’ve recently completed Jason Haddix’s two-day live course and wanted to share my insights and address any questions you might have. Before…
hack and bug bounty
Virtual Host Enumeration for Uncovering Hidden Subdomains
Medium
Virtual Host Enumeration for Uncovering Hidden Subdomains
Tools and Techniques for efficient virtual host discovery
hack and bug bounty
PG Practice — Algernon
Medium
PG Practice — Algernon
This is an easy box on Offsec’s Proving Grounds Practice but even easy boxes can be difficult at first or without proper technique.