hack and bug bounty
@hack_com
21
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
21 subscribers
hack and bug bounty
A Basic Guide for Beginners FROM SCRIPT KIDDIE ΤΟ ETHICAL HACKER : A DETAILED ROADMAP.
Medium
A Basic Guide for Beginners FROM SCRIPT KIDDIE ΤΟ ETHICAL HACKER : A DETAILED ROADMAP.
BASIC PRE REQUISITES:
hack and bug bounty
Title: Insufficient Account Process Validation Enables Account Takeover in Application XYZ
Medium
Title: Insufficient Account Process Validation Enables Account Takeover in Application XYZ
Severity: P3/P4 (Medium to Low)
hack and bug bounty
Title: Email Verification Bypass Vulnerability in Application XYZ
Medium
Title: Email Verification Bypass Vulnerability in Application XYZ
Severity: P3/P4 (Medium to Low)
hack and bug bounty
How i found a Email Verification Bypass Vulnerability in Application XYZ:
Medium
How i found a Email Verification Bypass Vulnerability in Application XYZ:
Severity: P4 (Low)
hack and bug bounty
Title: CSRF Vulnerability with Inadequate Referer Header Validation
Medium
Title: CSRF Vulnerability with Inadequate Referer Header Validation
Severity: P3/P4 (Medium to Low)
hack and bug bounty
“Hospitals and Hackers Cybersecurity in Healthcare Infrastructure”
Medium
“Hospitals and Hackers Cybersecurity in Healthcare Infrastructure”
In the digital age, where healthcare relies heavily on interconnected systems and electronic data, hospitals have become prime targets for…
hack and bug bounty
“Digital Defense for Dams Cybersecurity Measures in Critical Infrastructure”
Medium
“Digital Defense for Dams Cybersecurity Measures in Critical Infrastructure”
In the realm of critical infrastructure, dams stand as engineering marvels, providing essential services like water supply, hydroelectric…
hack and bug bounty
Penetration Testing Companies UK — Aardwolf Security
Medium
Penetration Testing Companies UK — Aardwolf Security
Aardwolf Security is a UK-based cybersecurity firm that specializes in penetration testing, offering services such as web application…
hack and bug bounty
Cybersecurity Studies-3 (Application Security)
Medium
Cybersecurity Studies-3 (Application Security)
InfoSec Domains Part 3 — Application Security
hack and bug bounty
How MAC Spoofing works and How attackers do that!!
Medium
How MAC Spoofing works and How attackers do that!!
Get ARP Spoofing/Poisoning with Gokuleswaran B
hack and bug bounty
Complete Guide On Becoming An Ethical Hacker In 2024 | USCSI
®
Medium
Complete Guide On Becoming An Ethical Hacker In 2024 | USCSI
®
Ethical hacking is about identifying vulnerabilities within an organization’s security system. Learn how to become a certified ethical…
hack and bug bounty
“Shipping Securely Cyber Risks and Solutions in Maritime Infrastructure”
Medium
“Shipping Securely Cyber Risks and Solutions in Maritime Infrastructure”
In the vast expanse of the world’s oceans, where maritime activities fuel global trade, the integration of digital technologies has ushered…
hack and bug bounty
Top 25 Advanced Google Dorks for OSINT and Bug Bounty Hunting
Medium
Top 25 Advanced Google Dorks for OSINT and Bug Bounty Hunting
Effective Techniques for Uncovering Information Security Vulnerabilities and Open-Source Intelligence.
hack and bug bounty
“From Farms to Forks Protecting Agriculture Infrastructure from Cyber Threats”
Medium
“From Farms to Forks Protecting Agriculture Infrastructure from Cyber Threats”
In the age of digital agriculture, where technology plays a vital role in modern farming practices, the protection of agriculture…
hack and bug bounty
Try Hack me — Advent Of Cyber 2023 Day 1 Write Up
Medium
Try Hack me — Advent Of Cyber 2023 Day 1 Write Up
Room: Advent of Cyber 2023 Day 1
hack and bug bounty
Learn Ethical Hacking for Free with SkillsForAll
Medium
Learn Ethical Hacking for Free with SkillsForAll
Cybersecurity is more important today than ever before. As companies and individuals rely more on technology and the internet for daily…
hack and bug bounty
Best Laptops for Pentesting for 2024
Medium
Best Laptops for Pentesting for 2024
Explore best Laptops for Cyber Security and Ethical Hacking
hack and bug bounty
Red Team Report Writing: Moving Past General Observations
Medium
Red Team Report Writing: Moving Past General Observations
When writing red team engagement reports, it’s relatively easy to explain what the team did, how they did it, and results of the actions…
hack and bug bounty
20 Days Of Hacking: Bug Bounty Challenge — Day 2
Medium
20 Days Of Hacking: Bug Bounty Challenge — Day 2
Welcome to Day 2(02/12/2023)
hack and bug bounty
Introducing HackGATE
™
: the industry’s first managed gateway for security testing
Medium
Introducing HackGATE
™
: the industry’s first managed gateway for security testing
Working with ethical hackers in penetration testing projects is a great way to strengthen your company’s security systems. However…