hack and bug bounty
@hack_com
21
subscribers
20.9K
links
Download Telegram
Join
hack and bug bounty
21 subscribers
hack and bug bounty
API Security Checklist
Medium
API Security Checklist
OWASP Top 10 for API Security
hack and bug bounty
JWT Explained in Depth | CyberSecurityTv
Medium
JWT Explained in Depth | CyberSecurityTv
JWT is a common form of method to maintain user sessions as well as authorize the users. It is essential to learn how JWT are formed and…
hack and bug bounty
Clickjacking: A Comprehensive Guide to Finding Clickjacking Vulnerabilities
Medium
Clickjacking: A Comprehensive Guide to Finding Clickjacking Vulnerabilities
In this section we will explain what clickjacking is, describe common examples of clickjacking attacks and discuss how to protect against…
hack and bug bounty
Vulnerable WordPress March 2024 (Kandovan)
Medium
Vulnerable WordPress March 2024 (Kandovan)
Github Repo: https://github.com/onhexgroup/Vulnerable-WordPress
hack and bug bounty
SQL Injection: A Simple Beginner’s Guide.
Medium
SQL Injection: A Simple Beginner’s Guide.
Introduction
hack and bug bounty
Privilege Escalation by manipulating endpoint
Medium
Privilege Escalation by manipulating endpoint
Hello Jai Sia Ram Dosto,
Here is my first blog.
I have found the Privilege Escalation during pen-testing.
Sometime we have to focus on…
hack and bug bounty
Google Bug Hunters
Medium
Google Bug Hunters
In the realm of cybersecurity, where threats lurk around every virtual corner, organizations must deploy formidable defenses to safeguard…
hack and bug bounty
hello
Medium
hello
I need help finding a hidden channel on discord but how do I find it??? without application or website.. just with the inspector and…
hack and bug bounty
IDOR to make comment in user’s private posts
Medium
IDOR to make comment in user’s private posts
Hello hackers, today i will show you how i can make comments in any user’s private post with IDOR.
hack and bug bounty
Easy Money from the Most Trivially Easy Broken Access Control
Medium
Easy Money from the Most Trivially Easy Broken Access Control
Hello, I am Abda11aTarek. Some of my friends asks me about how I achieved a listing in the Top 10 on Bugcrowd’s leaderboard for P1 and P2…
hack and bug bounty
How To Find Orgin IP
Medium
How To Find Orgin IP
Hi, Today is We learn how to find Orgin IP.
hack and bug bounty
Useful tools for bug hunter
Medium
Useful tools for bug hunter
Bug Bounty tool List
hack and bug bounty
ACCOUNT TAKEOVER VIA RESET PASSWORD JWT
Medium
ACCOUNT TAKEOVER VIA RESET PASSWORD JWT
In the name of Allah, the Most Gracious, the Most Merciful.
hack and bug bounty
Unexpected $300 for a Clikjacking Bug
Medium
Unexpected $300 for a Clikjacking Bug
Summary
hack and bug bounty
Become a Successful Bug Hunter in 2023
Medium
Become a Successful Bug Hunter in 2023
Bug bounty hunting is a process in which individuals or organizations find and report security vulnerabilities in software, websites, or…
hack and bug bounty
How I found P2 bug in 5 mins
Medium
How I found P2 bug in 5 mins
Sensitive information disclosure
hack and bug bounty
Secure Node.js API Development: Top 10 Best Practices
Medium
Secure Node.js API Development: Top 10 Best Practices
Introduction
hack and bug bounty
Protecting API Keys 2024 Edition
Medium
Protecting API Keys 2024 Edition
Did you know that Flutter has an official publication on Medium? They do, it’s creatively named ‘Flutter’. Android has one too called…
hack and bug bounty
What is a Polymorphic Virus detection and best practices?
Medium
What is a Polymorphic Virus detection and best practices?
In the ever-evolving sphere of digital tech, the persistent threat of cyber intrusions remains a formidable concern. A notable example is…
hack and bug bounty
Secure Your Data: Masking Sensitive Information in Spring Boot APIs
Medium
Secure Your Data: Masking Sensitive Information in Spring Boot APIs
Say Goodbye to Exposed Data: Master Data Masking in Spring Boot