hack and bug bounty
@hack_com
21
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
21 subscribers
hack and bug bounty
Cybersecurity and the Future Outlook
Medium
Cybersecurity and the Future Outlook
The history of cybersecurity dates back to the early days of computing when the focus was primarily on protecting hardware and physical…
hack and bug bounty
Cyber Briefing: 2023.11.28
Medium
Cyber Briefing: 2023.11.28
👉
What’s the latest in the cyber world today?
hack and bug bounty
The Bug Hunter’s Methodology Live Course Review
Medium
The Bug Hunter’s Methodology Live Course Review
I’ve recently completed Jason Haddix’s two-day live course and wanted to share my insights and address any questions you might have. Before…
hack and bug bounty
Virtual Host Enumeration for Uncovering Hidden Subdomains
Medium
Virtual Host Enumeration for Uncovering Hidden Subdomains
Tools and Techniques for efficient virtual host discovery
hack and bug bounty
PG Practice — Algernon
Medium
PG Practice — Algernon
This is an easy box on Offsec’s Proving Grounds Practice but even easy boxes can be difficult at first or without proper technique.
hack and bug bounty
Hall of Fame at NASA
Medium
Hall of Fame at NASA
Hello, I’m Bijoy B, an enthusiastic cybersecurity researcher affiliated with RedTeam Hacker Academy. I take pride in being the youngest…
hack and bug bounty
Predicting a “Random” Number
Medium
Predicting a “Random” Number
Have you ever looked at a code snippet that creates for example a password reset token or something, uses a non-cryptographically secure…
hack and bug bounty
PassTheCert when smart card logon fails
Medium
PassTheCert when smart card logon fails
Introduction
hack and bug bounty
A Arte da Guerra em Aplicações: Estratégias de Sun Tzu aplicadas em AppSec
Medium
A Arte da Guerra em Aplicações: Estratégias de Sun Tzu aplicadas em AppSec
Em uma era em que as batalhas são travadas não com espadas, mas com códigos, invocamos a sabedoria do antigo general Sun Tzu para guiar o…
hack and bug bounty
InfoSecSherpa’s News Roundup for Tuesday, November 28, 2023
Medium
InfoSecSherpa’s News Roundup for Tuesday, November 28, 2023
InfoSecSherpa: Your Guide Up a Mountain of Information!
hack and bug bounty
Windows Login Bypass
Medium
Windows Login Bypass
How to use a USB to Unlock your Box
hack and bug bounty
Day 10 Bug Bounty — 60 days 60bugs challenge — New Start!
Medium
Day 10 Bug Bounty — 60 days 60bugs challenge — New Start!
Hi there, its cyberbeat again! I have been almost disappeared for a month, was sick and procrastination dragged me out of the game. But…
hack and bug bounty
5 Hints To Grow Your X Followers
Medium
5 Hints To Grow Your X Followers
5 Hints To Grow Your X Followers From 0 To 10,000
hack and bug bounty
How to integrate ASPM with your application security program
Medium
How to integrate ASPM with your application security program
Application security posture management (ASPM) enables AppSec teams to continuously monitor, manage, and improve the security health of software applications throughout their lifecycle. It provides a…
hack and bug bounty
Cookie logging with reflected XSS
Medium
Cookie logging with reflected XSS
I stumbled upon an document camea and decided to explore it out of curiosity, aiming to understand its functioning better and identify any…
hack and bug bounty
OSINT: How to find information on anyone
Medium
OSINT: How to find information on anyone
Open Source Intelligence (OSINT) — is information gathering from publicly available sources and its analysis to produce an actionable…
hack and bug bounty
PII Disclosure Worth $750
Medium
PII Disclosure Worth $750
Hello hackers, I am back with a new bug bounty write-up. In this blog, I am going to show how I found PII disclosure in one of the Unicorn of India. The company is having a public bug bounty program…
hack and bug bounty
Mastering API Penetration Testing: A Comprehensive Guide for Security Pentesters
Medium
Mastering API Penetration Testing: A Comprehensive Guide for Security Pentesters
Understanding API Penetration Testing:
hack and bug bounty
Useful tools for bug hunter
Medium
Useful tools for bug hunter
Bug Bounty tool List
hack and bug bounty
How to make money legally as a Hacker
Medium
How to make money legally as a Hacker
Bug hunting is the process of finding and reporting vulnerabilities in software, websites, or applications. It is an important part of…