hack and bug bounty
@hack_com
21
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
21 subscribers
hack and bug bounty
Ödeme sayfasında Business Logic
Medium
Ödeme sayfasında Business Logic
Herkese merhaba !
hack and bug bounty
Remote Code Execution (RCE)
Medium
Remote Code Execution (RCE)
Introduction
hack and bug bounty
Insecure Direct Object Reference(IDOR)
Medium
Insecure Direct Object Reference(IDOR)
What is IDOR
hack and bug bounty
“Highways and Hijacks Securing Transportation Infrastructure from Cyber Attacks”
Medium
“Highways and Hijacks Securing Transportation Infrastructure from Cyber Attacks”
In the interconnected landscape of modern transportation, where highways are the lifelines of commerce and connectivity, the specter of…
hack and bug bounty
“Water Works Woes Cybersecurity Measures for Protecting Critical Water Infrastructure”
Medium
“Water Works Woes Cybersecurity Measures for Protecting Critical Water Infrastructure”
In the intricate web of critical infrastructure, water facilities stand as silent sentinels, ensuring the uninterrupted flow of a resource…
hack and bug bounty
“Pipeline Perils Safeguarding Critical Energy Infrastructure from Cyber Threats”
Medium
“Pipeline Perils Safeguarding Critical Energy Infrastructure from Cyber Threats”
In an era where energy infrastructure plays a pivotal role in powering societies, the specter of cyber threats looms large over critical…
hack and bug bounty
“Guardians of the Grid Cybersecurity Challenges in Power Infrastructure”
Medium
“Guardians of the Grid Cybersecurity Challenges in Power Infrastructure”
In an era where our daily lives are intricately woven into the digital fabric, the reliability and security of power infrastructure have…
hack and bug bounty
HACK THE BOX SEASONAL: Devvortex Walkthrough
Medium
HACK THE BOX SEASONAL: Devvortex Walkthrough
Devvortex, a seasonal machine on hack the box released on November 25, 2023. The machine is based on linux operating system and runs a…
hack and bug bounty
Escaping The Dangers: Ensuring Your Online Security
Medium
Escaping The Dangers: Ensuring Your Online Security
Cybersecurity is the practice of protecting computer systems, networks, data, and digital information from various threats and attacks…
hack and bug bounty
Escaping The Dangers: Ensuring Your Online Security
Medium
Escaping The Dangers: Ensuring Your Online Security
Cybersecurity is the practice of protecting computer systems, networks, data, and digital information from various threats and attacks…
hack and bug bounty
The Best 6 Programming Languages for Ethical Hacking
Medium
The Best 6 Programming Languages for Ethical Hacking
Discover the top six programming languages for ethical hacking in 2024 to accelerate you career path.
hack and bug bounty
Race Condition - A cURL Chaos
Medium
Race Condition - A cURL Chaos
Summary
hack and bug bounty
Easy Bug Hunting: HTML Injection Explained Step by Step”
Medium
Easy Bug Hunting: HTML Injection Explained Step by Step”
what is HTML injection?
hack and bug bounty
6 important risky areas related to WAF for auditors and risk assessors
Medium
6 important risky areas related to WAF for auditors and risk assessors
So, I wrote another blog post. On 6 important risky areas related to WAF. Useful for auditors and risk assessors. Please find a summary below. For details on each point, please visit my blog Web…
hack and bug bounty
Top Free Resources for Ethical Hacking and Bug Bounty Beginners & Experts
Medium
Top Free Resources for Ethical Hacking and Bug Bounty Beginners & Experts
If you’re just beginning your journey in the tech field or seeking to enhance your knowledge further, I have some top recommendations that…
hack and bug bounty
1.11 Lab: Blind SQL injection with time delays and information retrieval | 2023
Medium
1.11 Lab: Blind SQL injection with time delays and information retrieval | 2023
The tracking cookie in this Application is vulnerable to SQL injection. The results of the SQL query are not returned, and the application…
hack and bug bounty
Simple Recon Di Android Menggunakan Tools TheTimeMachine dan Dirsearch
Medium
Simple Recon Di Android Menggunakan Tools TheTimeMachine dan Dirsearch
Halo semuanya mari membahas tentang cara simple reconnaissance di android menggunakan tools TheTimeMachine dan juga Dirsearch untuk mencari file, dir dan juga endpoint sensitif website Reconnaissance…
hack and bug bounty
Demystifying RSA Encryption and Decryption with OpenSSL
Medium
Demystifying RSA Encryption and Decryption with OpenSSL
In the realm of secure communication, RSA encryption plays a pivotal role, offering a robust solution through its public-key cryptography…
hack and bug bounty
5+All Security Resource Digest for 2023–11–30
Medium
5+All Security Resource Digest for 2023–11–30
Here are my favorite 5 security resources added to my security resource database since yesterday. These resources will range from blogs and Reddit posts, through paid resource subscriptions and…
hack and bug bounty
Vulnhub cybersploit walkthrough
Medium
Vulnhub cybersploit walkthrough
Hey!