hack and bug bounty
@hack_com
21
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
21 subscribers
hack and bug bounty
5+All Security Resource Digest for 2023–11–28
Medium
5+All Security Resource Digest for 2023–11–28
Here are my favorite 5 security resources added to my security resource database since yesterday. These resources will range from blogs and Reddit posts, through paid resource subscriptions and…
hack and bug bounty
Zero-Day Vulnerabilities: Decrypting the Threat Landscape with VAPT
Medium
Zero-Day Vulnerabilities: Decrypting the Threat Landscape with VAPT
Zero-Day Vulnerabilities and VAPT: Understanding the challenges of zero-day threats and how VAPT services can mitigate their impact.
hack and bug bounty
A Graduate Student Journey to Ethical Hacking
Medium
A Graduate Student Journey to Ethical Hacking
From student to cyber security professional
hack and bug bounty
Detection Engineering — False Positives, False Negatives and Mis-Detections
Medium
Detection Engineering — False Positives, False Negatives and Mis-Detections
Detection engineering isn’t just stopping badness. Unfortunately, false positives and false negatives, as well as mis-detections…
hack and bug bounty
Unlocking the Power of Kali Linux: Resetting Passwords with Command Line Mastery
Medium
Unlocking the Power of Kali Linux: Resetting Passwords with Command Line Mastery
Kali Linux, a powerful and versatile penetration testing distribution, is a go-to choice for security professionals and enthusiasts alike…
hack and bug bounty
Cybersecurity and the Future Outlook
Medium
Cybersecurity and the Future Outlook
The history of cybersecurity dates back to the early days of computing when the focus was primarily on protecting hardware and physical…
hack and bug bounty
Cyber Briefing: 2023.11.28
Medium
Cyber Briefing: 2023.11.28
👉
What’s the latest in the cyber world today?
hack and bug bounty
The Bug Hunter’s Methodology Live Course Review
Medium
The Bug Hunter’s Methodology Live Course Review
I’ve recently completed Jason Haddix’s two-day live course and wanted to share my insights and address any questions you might have. Before…
hack and bug bounty
Virtual Host Enumeration for Uncovering Hidden Subdomains
Medium
Virtual Host Enumeration for Uncovering Hidden Subdomains
Tools and Techniques for efficient virtual host discovery
hack and bug bounty
PG Practice — Algernon
Medium
PG Practice — Algernon
This is an easy box on Offsec’s Proving Grounds Practice but even easy boxes can be difficult at first or without proper technique.
hack and bug bounty
Hall of Fame at NASA
Medium
Hall of Fame at NASA
Hello, I’m Bijoy B, an enthusiastic cybersecurity researcher affiliated with RedTeam Hacker Academy. I take pride in being the youngest…
hack and bug bounty
Predicting a “Random” Number
Medium
Predicting a “Random” Number
Have you ever looked at a code snippet that creates for example a password reset token or something, uses a non-cryptographically secure…
hack and bug bounty
PassTheCert when smart card logon fails
Medium
PassTheCert when smart card logon fails
Introduction
hack and bug bounty
A Arte da Guerra em Aplicações: Estratégias de Sun Tzu aplicadas em AppSec
Medium
A Arte da Guerra em Aplicações: Estratégias de Sun Tzu aplicadas em AppSec
Em uma era em que as batalhas são travadas não com espadas, mas com códigos, invocamos a sabedoria do antigo general Sun Tzu para guiar o…
hack and bug bounty
InfoSecSherpa’s News Roundup for Tuesday, November 28, 2023
Medium
InfoSecSherpa’s News Roundup for Tuesday, November 28, 2023
InfoSecSherpa: Your Guide Up a Mountain of Information!
hack and bug bounty
Windows Login Bypass
Medium
Windows Login Bypass
How to use a USB to Unlock your Box
hack and bug bounty
Day 10 Bug Bounty — 60 days 60bugs challenge — New Start!
Medium
Day 10 Bug Bounty — 60 days 60bugs challenge — New Start!
Hi there, its cyberbeat again! I have been almost disappeared for a month, was sick and procrastination dragged me out of the game. But…
hack and bug bounty
5 Hints To Grow Your X Followers
Medium
5 Hints To Grow Your X Followers
5 Hints To Grow Your X Followers From 0 To 10,000
hack and bug bounty
How to integrate ASPM with your application security program
Medium
How to integrate ASPM with your application security program
Application security posture management (ASPM) enables AppSec teams to continuously monitor, manage, and improve the security health of software applications throughout their lifecycle. It provides a…
hack and bug bounty
Cookie logging with reflected XSS
Medium
Cookie logging with reflected XSS
I stumbled upon an document camea and decided to explore it out of curiosity, aiming to understand its functioning better and identify any…