hack and bug bounty
@hack_com
21
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
21 subscribers
hack and bug bounty
Elon Musk Apologies for Antisemitic X Post, But Curses Advertisers Who Left
Medium
Elon Musk Apologies for Antisemitic X Post, But Curses Advertisers Who Left
Elon Musk recently addressed the crisis surrounding X at The New York Times DealBook Summit. The controversy around advertisers pulling…
hack and bug bounty
“Defense in Depth Layered Strategies for Cyber Resilience”
Medium
“Defense in Depth Layered Strategies for Cyber Resilience”
In the ever-evolving landscape of cybersecurity, where the stakes are high and the threat landscape is dynamic, securing access to…
hack and bug bounty
5+All Security Resource Digest for 2023–12–4
Medium
5+All Security Resource Digest for 2023–12–4
Browse these and all resources added in the last day in my personal security resource database, the SSD, for free at Go.StrykerNoStriking.com/Complete-DB. To search and use any resource record from…
hack and bug bounty
Bypass Windows Defender Executing Shellcode using FreeLoaderInjector
Medium
Bypass Windows Defender Executing Shellcode using FreeLoaderInjector
Welcome to my new article, today i will show you my new tool to execute shellcode in Windows OS bypassing the Windows Defender using…
hack and bug bounty
Exploring the Landscape: Types of Cyber Security Demystified
Medium
Exploring the Landscape: Types of Cyber Security Demystified
In an era where the digital landscape evolves at an unprecedented pace, the need for robust cyber security has never been more critical…
hack and bug bounty
Effective RBAC and least privilege using minimal resources.
Medium
Effective RBAC and least privilege using minimal resources.
Insider threat is one of the most sensitive and hardest security issue for organizations to prepare for as violations carried out by…
hack and bug bounty
Pass The Hash Attack
Medium
Pass The Hash Attack
PtH เป็นการโจมตีเครือข่ายประเภทหนึ่ง โดยผู้โจมตีจะขโมยรหัสผ่านของผู้ใช้ที่ถูกเข้ารหัส (password hash)…
hack and bug bounty
My personal collection for Pen testing and CyberNotes
Medium
My personal collection for Pen testing and CyberNotes
My Personols Noots so I dont forget |Pen Testing|
hack and bug bounty
The Hidden Dangers Lurking in Your Active Directory Certificate Services – What You Need to Know…
Medium
The Hidden Dangers Lurking in Your Active Directory Certificate Services – What You Need to Know…
Active Directory Certificate Services (AD CS) is a critical component within the Microsoft Windows Server ecosystem, providing Public Key…
hack and bug bounty
IWCON 0x03 is 13 Days Away
Medium
IWCON 0x03 is 13 Days Away
Have you reserved your seat yet?
hack and bug bounty
Cyber Briefing: 2023.12.04
Medium
Cyber Briefing: 2023.12.04
👉
What’s happening in cybersecurity today?
hack and bug bounty
“Cybersecurity by Design Integrating Security from the Start”
Medium
“Cybersecurity by Design Integrating Security from the Start”
In an era defined by digital innovation and connectivity, the imperative to prioritize cybersecurity has become a foundational element of…
hack and bug bounty
“Continuous Monitoring Staying Vigilant in the Cyber Battleground”
Medium
“Continuous Monitoring Staying Vigilant in the Cyber Battleground”
In the relentless realm of cybersecurity, where threats lurk in the shadows and the digital landscape is ever-changing, maintaining a…
hack and bug bounty
Advent of Cyber 2023 — Day 4 Writeup with Answers by Karthikeyan Nagaraj | TryHackMe
Medium
Advent of Cyber 2023 — Day 4 Writeup with Answers by Karthikeyan Nagaraj | TryHackMe
TryHackMe — Brute Forcing [ Baby, It’s CeWLd Outside ] — The team detects a malicious actor using an employee account to access an…
hack and bug bounty
Vulnerable WordPress November 2023 (Book of Dede Korkut)
Medium
Vulnerable WordPress November 2023 (Book of Dede Korkut)
Today, we see the release of various vulnerabilities in various programs. If you’re a security researcher, you’re probably tempted to work…
hack and bug bounty
Vulnerability Management with DefectDojo — is it great for DevSecOps?
Medium
Vulnerability Management with DefectDojo — is it great for DevSecOps?
Presenting capabilities of DefectDojo in context of Vulnerability Management for DevSecOps and traditional application security engineers.
hack and bug bounty
Javascript Analysis to SQL injection
Medium
Javascript Analysis to SQL injection
Hi Hackers, I’m Mostafa Elguerdawi.
hack and bug bounty
Defending Your Digital Fortress: Cloaked Wireless’s Unrivaled Shield Against SIM Swap Attacks
Medium
Defending Your Digital Fortress: Cloaked Wireless’s Unrivaled Shield Against SIM Swap Attacks
In the ever-evolving landscape of digital threats, SIM swap attacks have emerged as a significant concern, posing risks to user accounts…
hack and bug bounty
Guarding the Titans: Rising SIM Swap Attacks on Prominent Figures on Social Media
Medium
Guarding the Titans: Rising SIM Swap Attacks on Prominent Figures on Social Media
In the ever-expanding digital landscape, the rise of SIM swap attacks has become a formidable threat, particularly targeting vocal…
hack and bug bounty
web vulnerabilities scan with WMAP
Medium
web vulnerabilities scan with WMAP
WMAP (Web Application Mapping and Penetration Testing) is a module within the Metasploit Framework that is used to identify and exploit…