hack and bug bounty
@hack_com
21
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
21 subscribers
hack and bug bounty
Walmart Joins Growing Exodus From Elon Musk’s X As Advertisers Raise Concerns Over Hate Speech.
Medium
Walmart Joins Growing Exodus From Elon Musk’s X As Advertisers Raise Concerns Over Hate Speech.
In the latest turn of events, retail giant Walmart has publicly declared its decision to halt advertising spending on X, Elon Musk’s social…
hack and bug bounty
My First Valid Bug!!!
Medium
My First Valid Bug!!!
Hey Everyone! Today I am going to share my experience of the first valid bug that I found. So let’s dive into it.
hack and bug bounty
Phoneinfoga: A phone number OSINT framework | Day15 of 30DaysOfOSINT
Medium
Phoneinfoga: A phone number OSINT framework | Day15 of 30DaysOfOSINT
The main aim of writing this blog is to get you all familiar with Phoneinfoga, its features, its use cases, and its working.
hack and bug bounty
Cyber Resilience in Industrial Control Systems Protecting Manufacturing Infrastructure”
Medium
Cyber Resilience in Industrial Control Systems Protecting Manufacturing Infrastructure”
In the heart of modern manufacturing facilities, Industrial Control Systems (ICS) orchestrate the intricate dance of machines and processes…
hack and bug bounty
“Bridging the Gaps Cybersecurity Challenges in Critical Infrastructure Supply Chains”
Medium
“Bridging the Gaps Cybersecurity Challenges in Critical Infrastructure Supply Chains”
The intricate web of critical infrastructure supply chains forms the backbone of modern societies, ensuring the continuous flow of…
hack and bug bounty
“Protecting National Identity Cybersecurity Measures in Government Infrastructure”
Medium
“Protecting National Identity Cybersecurity Measures in Government Infrastructure”
In an era where nations rely heavily on digital technologies to govern, communicate, and provide services to citizens, the protection of…
hack and bug bounty
“The Backbone of Connectivity Cybersecurity Measures for Internet Infrastructure”
Medium
“The Backbone of Connectivity Cybersecurity Measures for Internet Infrastructure”
In the ever-evolving landscape of digital communication, the internet serves as the backbone of connectivity, facilitating the seamless…
hack and bug bounty
Nmap Host Discovery: Explore the Network Maze
Medium
Nmap Host Discovery: Explore the Network Maze
Embark on a journey of network exploration with Nmap, the ultimate tool for uncovering hidden hosts and mapping the digital landscape.
hack and bug bounty
“Safeguarding the Skies Cyber Threats to Air Traffic Control Infrastructure”
Medium
“Safeguarding the Skies Cyber Threats to Air Traffic Control Infrastructure”
In the modern era, air travel has become an integral part of global connectivity, with air traffic control (ATC) infrastructure serving as…
hack and bug bounty
3 Types Of Penetration Testing In Ethical Hacking
Medium
3 Types Of Penetration Testing In Ethical Hacking
In the ever-evolving landscape of cybersecurity, penetration testing stands as a crucial line of defense against potential threats. Also…
hack and bug bounty
The Ultimate Ethical Hacking Roadmap: A Comprehensive Guide
Medium
The Ultimate Ethical Hacking Roadmap: A Comprehensive Guide
Ethical hacking, also known as penetration testing or white-hat hacking, plays a crucial role in securing digital systems and networks. As…
hack and bug bounty
I was able to Exploit a company data 30 years sales record | Real Hacking |
Medium
I was able to Exploit a company data 30 years sales record | Real Hacking |
This is the fourth exploit of my life and one that is going to give me a new job
hack and bug bounty
Business Logic Vulnerability: Payment bypass
Medium
Business Logic Vulnerability: Payment bypass
Who doesn’t like coffee? One day my friends took me to the Cafe for a treat, it was new for me and also an expensive one (cafe like…
hack and bug bounty
Tempest Challenge Write-up (Tryhackme)
Medium
Tempest Challenge Write-up (Tryhackme)
Hello folks, This m0_4de1, Today I will walk through Tempest challenge from Tryhackme hoping to benefit from it.
hack and bug bounty
VulnHub — FristiLeaks 1.3 Writeup — by dollarboysushil
Medium
VulnHub — FristiLeaks 1.3 Writeup — by dollarboysushil
Vulnhub FristiLeaks https://www.vulnhub.com/entry/fristileaks-13,133/ A small VM made for a Dutch informal hacker meetup called…
hack and bug bounty
Streamable Finance Bug Bounty Campaign is live!
Medium
Streamable Finance Bug Bounty Campaign is live!
Streamable Finance is now live!
hack and bug bounty
Advent of Cyber 2023 — Day 3 Writeup with Answers by Karthikeyan Nagaraj | TryHackMe
Medium
Advent of Cyber 2023 — Day 3 Writeup with Answers by Karthikeyan Nagaraj | TryHackMe
Brute Forcing [ Hydra Is Coming To Town ] — The server room is locked down. The team needs to regain access to recover backup tapes…
hack and bug bounty
How to debug Android/iOS native library using GDB debugger?
Medium
How to debug Android/iOS native library using GDB debugger?
Hi Guys, after a long time, I am writing a new blog that will help you guys while performing Android/iOS penetration testing. I am going to…
hack and bug bounty
Hacking Android Remotely using Kali Linux |using Metasploit-Framework
Medium
Hacking Android Remotely using Kali Linux |using Metasploit-Framework
we use msfvenom to create the payload and save it as a .apk file. After creating the payload, we need to configure a monitor for the…
hack and bug bounty
WordPress Migration, Backup and transfer.
Medium
WordPress Migration, Backup and transfer.
Content transfer from one blog to another is more common than you might think. Perhaps the domain name has changed, or you’ve moved to a…