hack and bug bounty
@hack_com
21
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
21 subscribers
hack and bug bounty
“Pipeline Perils Safeguarding Critical Energy Infrastructure from Cyber Threats”
Medium
“Pipeline Perils Safeguarding Critical Energy Infrastructure from Cyber Threats”
In an era where energy infrastructure plays a pivotal role in powering societies, the specter of cyber threats looms large over critical…
hack and bug bounty
“Guardians of the Grid Cybersecurity Challenges in Power Infrastructure”
Medium
“Guardians of the Grid Cybersecurity Challenges in Power Infrastructure”
In an era where our daily lives are intricately woven into the digital fabric, the reliability and security of power infrastructure have…
hack and bug bounty
HACK THE BOX SEASONAL: Devvortex Walkthrough
Medium
HACK THE BOX SEASONAL: Devvortex Walkthrough
Devvortex, a seasonal machine on hack the box released on November 25, 2023. The machine is based on linux operating system and runs a…
hack and bug bounty
Escaping The Dangers: Ensuring Your Online Security
Medium
Escaping The Dangers: Ensuring Your Online Security
Cybersecurity is the practice of protecting computer systems, networks, data, and digital information from various threats and attacks…
hack and bug bounty
Escaping The Dangers: Ensuring Your Online Security
Medium
Escaping The Dangers: Ensuring Your Online Security
Cybersecurity is the practice of protecting computer systems, networks, data, and digital information from various threats and attacks…
hack and bug bounty
The Best 6 Programming Languages for Ethical Hacking
Medium
The Best 6 Programming Languages for Ethical Hacking
Discover the top six programming languages for ethical hacking in 2024 to accelerate you career path.
hack and bug bounty
Race Condition - A cURL Chaos
Medium
Race Condition - A cURL Chaos
Summary
hack and bug bounty
Easy Bug Hunting: HTML Injection Explained Step by Step”
Medium
Easy Bug Hunting: HTML Injection Explained Step by Step”
what is HTML injection?
hack and bug bounty
6 important risky areas related to WAF for auditors and risk assessors
Medium
6 important risky areas related to WAF for auditors and risk assessors
So, I wrote another blog post. On 6 important risky areas related to WAF. Useful for auditors and risk assessors. Please find a summary below. For details on each point, please visit my blog Web…
hack and bug bounty
Top Free Resources for Ethical Hacking and Bug Bounty Beginners & Experts
Medium
Top Free Resources for Ethical Hacking and Bug Bounty Beginners & Experts
If you’re just beginning your journey in the tech field or seeking to enhance your knowledge further, I have some top recommendations that…
hack and bug bounty
1.11 Lab: Blind SQL injection with time delays and information retrieval | 2023
Medium
1.11 Lab: Blind SQL injection with time delays and information retrieval | 2023
The tracking cookie in this Application is vulnerable to SQL injection. The results of the SQL query are not returned, and the application…
hack and bug bounty
Simple Recon Di Android Menggunakan Tools TheTimeMachine dan Dirsearch
Medium
Simple Recon Di Android Menggunakan Tools TheTimeMachine dan Dirsearch
Halo semuanya mari membahas tentang cara simple reconnaissance di android menggunakan tools TheTimeMachine dan juga Dirsearch untuk mencari file, dir dan juga endpoint sensitif website Reconnaissance…
hack and bug bounty
Demystifying RSA Encryption and Decryption with OpenSSL
Medium
Demystifying RSA Encryption and Decryption with OpenSSL
In the realm of secure communication, RSA encryption plays a pivotal role, offering a robust solution through its public-key cryptography…
hack and bug bounty
5+All Security Resource Digest for 2023–11–30
Medium
5+All Security Resource Digest for 2023–11–30
Here are my favorite 5 security resources added to my security resource database since yesterday. These resources will range from blogs and Reddit posts, through paid resource subscriptions and…
hack and bug bounty
Vulnhub cybersploit walkthrough
Medium
Vulnhub cybersploit walkthrough
Hey!
hack and bug bounty
Rise of Broken Access Control
Medium
Rise of Broken Access Control
Why authorization flaws are trendy and easier to discover
hack and bug bounty
Cyber Briefing: 2023.11.30
Medium
Cyber Briefing: 2023.11.30
👉
What’s going on in the cyber world today?
hack and bug bounty
Proving Grounds Practice — Access
Medium
Proving Grounds Practice — Access
This is an intermediate box on Offsec’s PG Practice but the community has rated it ‘Very Hard’.
hack and bug bounty
Learning Hacking/Penetration Testing: The Path I followed
Medium
Learning Hacking/Penetration Testing: The Path I followed
Want to Learn Real Hacking? If so, you are in the right place. The Reason why i have written this article is Because a lot of people…
hack and bug bounty
Day 618
Medium
Day 618
Watched Elon Musk tell advertisers to GFY if they try and blackmail him with money this morning. Mad respect to big bro.