hack and bug bounty
@hack_com
21
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
21 subscribers
hack and bug bounty
“Protecting National Identity Cybersecurity Measures in Government Infrastructure”
Medium
“Protecting National Identity Cybersecurity Measures in Government Infrastructure”
In an era where nations rely heavily on digital technologies to govern, communicate, and provide services to citizens, the protection of…
hack and bug bounty
“The Backbone of Connectivity Cybersecurity Measures for Internet Infrastructure”
Medium
“The Backbone of Connectivity Cybersecurity Measures for Internet Infrastructure”
In the ever-evolving landscape of digital communication, the internet serves as the backbone of connectivity, facilitating the seamless…
hack and bug bounty
Nmap Host Discovery: Explore the Network Maze
Medium
Nmap Host Discovery: Explore the Network Maze
Embark on a journey of network exploration with Nmap, the ultimate tool for uncovering hidden hosts and mapping the digital landscape.
hack and bug bounty
“Safeguarding the Skies Cyber Threats to Air Traffic Control Infrastructure”
Medium
“Safeguarding the Skies Cyber Threats to Air Traffic Control Infrastructure”
In the modern era, air travel has become an integral part of global connectivity, with air traffic control (ATC) infrastructure serving as…
hack and bug bounty
3 Types Of Penetration Testing In Ethical Hacking
Medium
3 Types Of Penetration Testing In Ethical Hacking
In the ever-evolving landscape of cybersecurity, penetration testing stands as a crucial line of defense against potential threats. Also…
hack and bug bounty
The Ultimate Ethical Hacking Roadmap: A Comprehensive Guide
Medium
The Ultimate Ethical Hacking Roadmap: A Comprehensive Guide
Ethical hacking, also known as penetration testing or white-hat hacking, plays a crucial role in securing digital systems and networks. As…
hack and bug bounty
I was able to Exploit a company data 30 years sales record | Real Hacking |
Medium
I was able to Exploit a company data 30 years sales record | Real Hacking |
This is the fourth exploit of my life and one that is going to give me a new job
hack and bug bounty
Business Logic Vulnerability: Payment bypass
Medium
Business Logic Vulnerability: Payment bypass
Who doesn’t like coffee? One day my friends took me to the Cafe for a treat, it was new for me and also an expensive one (cafe like…
hack and bug bounty
Tempest Challenge Write-up (Tryhackme)
Medium
Tempest Challenge Write-up (Tryhackme)
Hello folks, This m0_4de1, Today I will walk through Tempest challenge from Tryhackme hoping to benefit from it.
hack and bug bounty
VulnHub — FristiLeaks 1.3 Writeup — by dollarboysushil
Medium
VulnHub — FristiLeaks 1.3 Writeup — by dollarboysushil
Vulnhub FristiLeaks https://www.vulnhub.com/entry/fristileaks-13,133/ A small VM made for a Dutch informal hacker meetup called…
hack and bug bounty
Streamable Finance Bug Bounty Campaign is live!
Medium
Streamable Finance Bug Bounty Campaign is live!
Streamable Finance is now live!
hack and bug bounty
Advent of Cyber 2023 — Day 3 Writeup with Answers by Karthikeyan Nagaraj | TryHackMe
Medium
Advent of Cyber 2023 — Day 3 Writeup with Answers by Karthikeyan Nagaraj | TryHackMe
Brute Forcing [ Hydra Is Coming To Town ] — The server room is locked down. The team needs to regain access to recover backup tapes…
hack and bug bounty
How to debug Android/iOS native library using GDB debugger?
Medium
How to debug Android/iOS native library using GDB debugger?
Hi Guys, after a long time, I am writing a new blog that will help you guys while performing Android/iOS penetration testing. I am going to…
hack and bug bounty
Hacking Android Remotely using Kali Linux |using Metasploit-Framework
Medium
Hacking Android Remotely using Kali Linux |using Metasploit-Framework
we use msfvenom to create the payload and save it as a .apk file. After creating the payload, we need to configure a monitor for the…
hack and bug bounty
WordPress Migration, Backup and transfer.
Medium
WordPress Migration, Backup and transfer.
Content transfer from one blog to another is more common than you might think. Perhaps the domain name has changed, or you’ve moved to a…
hack and bug bounty
SSRF(Server Side Request Forgery) Zafiyeti
Medium
SSRF(Server Side Request Forgery) Zafiyeti
SSRF ( Server Side Request Forgery) Nedir ?
hack and bug bounty
Advent of Cyber 2023: Day 1 — Machine Learning and Chatbots (No Answers)
Medium
Advent of Cyber 2023: Day 1 — Machine Learning and Chatbots (No Answers)
Pre-Amble
hack and bug bounty
InfoSecSherpa’s News Roundup for Sunday, December 3, 2023
Medium
InfoSecSherpa’s News Roundup for Sunday, December 3, 2023
InfoSecSherpa: Your Guide Up a Mountain of Information!
hack and bug bounty
How to debug android native libraries using JEB decompiler?
Medium
How to debug android native libraries using JEB decompiler?
Hello guys, welcome back to the new blog.
In this blog, again I am going to show you one more method to debug native libraries of an…
hack and bug bounty
How to bypass debugger detection in Android/iOS native libraries using IDA Pro?
Medium
How to bypass debugger detection in Android/iOS native libraries using IDA Pro?
Hello guys, I hope you all are doing well.