hack and bug bounty
@hack_com
21
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
21 subscribers
hack and bug bounty
SSRF(Server Side Request Forgery) Zafiyeti
Medium
SSRF(Server Side Request Forgery) Zafiyeti
SSRF ( Server Side Request Forgery) Nedir ?
hack and bug bounty
Advent of Cyber 2023: Day 1 — Machine Learning and Chatbots (No Answers)
Medium
Advent of Cyber 2023: Day 1 — Machine Learning and Chatbots (No Answers)
Pre-Amble
hack and bug bounty
InfoSecSherpa’s News Roundup for Sunday, December 3, 2023
Medium
InfoSecSherpa’s News Roundup for Sunday, December 3, 2023
InfoSecSherpa: Your Guide Up a Mountain of Information!
hack and bug bounty
How to debug android native libraries using JEB decompiler?
Medium
How to debug android native libraries using JEB decompiler?
Hello guys, welcome back to the new blog.
In this blog, again I am going to show you one more method to debug native libraries of an…
hack and bug bounty
How to bypass debugger detection in Android/iOS native libraries using IDA Pro?
Medium
How to bypass debugger detection in Android/iOS native libraries using IDA Pro?
Hello guys, I hope you all are doing well.
hack and bug bounty
Try Hack me — Advent Of Cyber 2023 Day 3 Write Up — Hydra is Coming to Town
Medium
Try Hack me — Advent Of Cyber 2023 Day 3 Write Up — Hydra is Coming to Town
Room: Advent of Cyber 2023 Day 3
hack and bug bounty
The Story of How I Hacked one of the online payment system website
Medium
The Story of How I Hacked one of the online payment system website
Back in 2018 when I was in high school, the site owner asked me to check the security of their website. They were curious because I had…
hack and bug bounty
The story of how I finally got my first money from hacking
Medium
The story of how I finally got my first money from hacking
Zupp folks, I'm making this post just to share what kind of steps I am making to discover the vulnerability for learning purposes ofc
✌️
.
hack and bug bounty
What is SOCKS Protocol? (Socket Secure)
Medium
What is SOCKS Protocol? (Socket Secure)
SOCKS is an Internet protocol that exchanges network packets between any client and a server through a designated proxy. In addition, the…
hack and bug bounty
T’was the Night Before the Breach — 2023 Edition
Medium
T’was the Night Before the Breach — 2023 Edition
T’was the night before the breach, and all through the message board, not a creature was stirring, not even the sharing of national…
hack and bug bounty
How I Created an Advanced Web Code Analyzer Using ChatGPT
Medium
How I Created an Advanced Web Code Analyzer Using ChatGPT
In this article, I’ll take you through my process of creating and developing a Web Code Analyzer using ChatGPT.
hack and bug bounty
Azure Log Analysis: Real-Life Incidents and Practical Tips to Safeguard
Medium
Azure Log Analysis: Real-Life Incidents and Practical Tips to Safeguard
Incident response is a critical component of cybersecurity, involving the identification, containment, eradication, recovery, and lessons…
hack and bug bounty
HackTheBox - Jerry
Medium
HackTheBox - Jerry
Summary
hack and bug bounty
Ethical Hacking 101: A Beginner’s Guide | 2024
Medium
Ethical Hacking 101: A Beginner’s Guide | 2024
Introduction
hack and bug bounty
#1Ethical Hacking : Unveiling Ultimate Battle for Digital Supremacy.
Medium
#1Ethical Hacking : Unveiling Ultimate Battle for Digital Supremacy.
Introduction:
hack and bug bounty
Crypto Weekend Recap: SEC’s Judicial Rebuke, Platypus Hack Acquittal, and More with Faith Protocol
Medium
Crypto Weekend Recap: SEC’s Judicial Rebuke, Platypus Hack Acquittal, and More with Faith Protocol
Discover the weekend’s crypto highlights at Faith Protocol: SEC faces judicial rebuke, Platypus Finance hack acquittal, and Spain arrests…
hack and bug bounty
Extract Passwords & Other User Credentials with LaZagne
Medium
Extract Passwords & Other User Credentials with LaZagne
In this tutorial, I will show you how to retrieve all saved passwords from your computer or an exploited system using a tool called…
hack and bug bounty
Tired of Hackers Playing “Find the Flag” in Your Systems? Enter PTaaS: Your Security Superpower
Medium
Tired of Hackers Playing “Find the Flag” in Your Systems? Enter PTaaS: Your Security Superpower
Imagine a world where elite hackers, instead of wreaking havoc, become your allies. They probe your defenses, uncover vulnerabilities you…
hack and bug bounty
Advent of Cyber 2023 -Day 3 Walkthrough.. By Manoj Mudabagil.
Medium
Advent of Cyber 2023 -Day 3 Walkthrough.. By Manoj Mudabagil.
[Day 3] Brute-forcing Hydra is Coming to Town
hack and bug bounty
LFI on Microsoft
Medium
LFI on Microsoft
In today's article, I show you how me and my friend found lots of LFI(Local File Inclusion) on Microsoft.