The Bug Bounty Hunter
Happy hunting! thebugbountyhunter.com [email protected]
إظهار المزيد- المشتركون
- التغطية البريدية
- ER - نسبة المشاركة
جاري تحميل البيانات...
جاري تحميل البيانات...
📚 Purchase my Bug Bounty Course here 👉🏼 bugbounty.nahamsec.training 💵 Support the Channel: You can support the channel by becoming a member and get access exclusive content, behind the scenes, live hacking session and more! ☕️ Buy Me Coffee:
https://www.buymeacoffee.com/nahamsecJOIN DISCORD:
https://discordapp.com/invite/ucCz7uh🆓 🆓 🆓 $200 DigitalOcean Credit:
https://m.do.co/c/3236319b9d0b💬 Social Media -
https://twitter.com/nahamsec-
https://instagram.com/nahamsec-
https://twitch.com/nahamsec-
https://facebook.com/nahamsec1#bugbounty #ethicalhacking #infosec #cybersecurity #redteam #webapp
While working on a target, some of the most interesting parts to test is its API. APIs are dynamics, they get updated more often then other…
Click to see the public record of the drawing conducted by RandomPicker.
VirtualBox VM Escape Vulnerability - A Research Walkthrough
To outmanoeuvre cybercriminals, the key is to beat them to the punch by working with ethical hackers. However, a question often arises: Can we trust ethical hackers? Especially when we don’t know them personally? Through platforms such as Intigriti, the short answer is yes, you can trust these individuals. However, the word ‘hacker’ carries a […]
CISA issued a warning to CISOs that it was investigating a breach of Sisense. Let's make sense of this breach and what it means for organizations.
Auth0 Misconfiguration: Bypassed Login Restrictions. #BugBounty #Security
In part-9 of Advanced Frida Usage, learn about API provided by frida called Memory.scan() which can help you to scan bytes from memory & help you to patch them.
This is the second part of our blog series on How we escalated a DOM XSS to a sophisticated 1-click Account Takeover for $8000