cookie

Мы используем файлы cookie для улучшения сервиса. Нажав кнопку «Принять все», вы соглашаетесь с использованием cookies.

Рекламные посты
33 766
Подписчики
+2124 часа
+2317 дней
+92730 дней

Загрузка данных...

Прирост подписчиков

Загрузка данных...

Creating A Wordlist For CI/CD Hacking (Using AI) https://www.youtube.com/watch?v=6KGWNPEc4uY
Показать все...
Creating A Wordlist For CI/CD Hacking (Using AI)

📚 Purchase my Bug Bounty Course here 👉🏼 bugbounty.nahamsec.training 💵 Support the Channel: You can support the channel by becoming a member and get access exclusive content, behind the scenes, live hacking session and more! ☕️ Buy Me Coffee:

https://www.buymeacoffee.com/nahamsec

JOIN DISCORD:

https://discordapp.com/invite/ucCz7uh

🆓 🆓 🆓 $200 DigitalOcean Credit:

https://m.do.co/c/3236319b9d0b

💬 Social Media -

https://twitter.com/nahamsec

-

https://instagram.com/nahamsec

-

https://twitch.com/nahamsec

-

https://facebook.com/nahamsec1

#bugbounty #ethicalhacking #infosec #cybersecurity #redteam #webapp

1🤔 1
Показать все...
5 Methods I Use To Discover APIs

While working on a target, some of the most interesting parts to test is its API. APIs are dynamics, they get updated more often then other…

Hello Hackers 👋! We're thrilled to announce that we've already selected the three lucky winners of our prizes. But before we dive into that, we want to extend a heartfelt thank you to each and every one of you for taking the time to participate in our annual survey. Your valuable feedback is crucial to us as it helps us better understand the needs of our community and provides us with insights to continue improving and adding value. 🍀 Congratulations to all three of you! We'll be reaching out to you shortly to arrange the delivery of your well-deserved prizes. It is the public URL https://app.randompicker.com/protocol/835172x45843 Once again, thank you all for your participation and for helping us make the Bug Bounty Hunter community an even better place Let's keep moving forward together! 🚀 Happy Hunting The Bug Bounty Hunter Team
Показать все...
Random Picker Record: 2024 Bug Bounty Hunter Report (835172)

Click to see the public record of the drawing conducted by RandomPicker.

👍 2
How 18-Year-Old Me Discovered a VirtualBox VM Escape Vulnerability https://j0nathanj.github.io/Dusting-off-the-VM-Escape
Показать все...
How 18-Year-Old Me Discovered a VirtualBox VM Escape Vulnerability

VirtualBox VM Escape Vulnerability - A Research Walkthrough

🤔 3👍 1
Показать все...
The truth about ethical hackers: Are they trustworthy?   - Intigriti

To outmanoeuvre cybercriminals, the key is to beat them to the punch by working with ethical hackers. However, a question often arises: Can we trust ethical hackers? Especially when we don’t know them personally?   Through platforms such as Intigriti, the short answer is yes, you can trust these individuals. However, the word ‘hacker’ carries a […]

1
Показать все...
Making Sense of the Sisense News

CISA issued a warning to CISOs that it was investigating a breach of Sisense. Let's make sense of this breach and what it means for organizations.

Показать все...
How I Exploited an Auth0 Misconfiguration to Bypass Login Restrictions

Auth0 Misconfiguration: Bypassed Login Restrictions. #BugBounty #Security

1
We Hacked Google A.I. for $50,000 - Lupin & Holmes https://www.landh.tech/blog/20240304-google-hack-50000/
Показать все...
We Hacked Google A.I. for $50,000 - Lupin & Holmes

👍 1
Advanced Frida Usage Part 9 – Memory Scanning in Android https://8ksec.io/advanced-frida-usage-part-9-memory-scanning-in-android/
Показать все...
Advanced Frida Usage Part 9 – Memory Scanning in Android - 8kSec

In part-9 of Advanced Frida Usage, learn about API provided by frida called Memory.scan() which can help you to scan bytes from memory & help you to patch them.

👍 1
How we escalated a DOM XSS to a sophisticated 1-click Account Takeover for $8000 - Part 2 https://thefrogsec.github.io/2024/04/06/How-we-escalated-a-DOM-XSS-to-a-sophisticated-1-click-Account-Takeover-for-8000-Part-2/
Показать все...
How we escalated a DOM XSS to a sophisticated 1-click Account Takeover for $8000 - Part 2

This is the second part of our blog series on How we escalated a DOM XSS to a sophisticated 1-click Account Takeover for $8000

2