cookie

Ми використовуємо файли cookie для покращення вашого досвіду перегляду. Натиснувши «Прийняти все», ви погоджуєтеся на використання файлів cookie.

Рекламні дописи
33 761
Підписники
+3424 години
+2267 днів
+94430 днів

Триває завантаження даних...

Приріст підписників

Триває завантаження даних...

Creating A Wordlist For CI/CD Hacking (Using AI) https://www.youtube.com/watch?v=6KGWNPEc4uY
Показати все...
Creating A Wordlist For CI/CD Hacking (Using AI)

📚 Purchase my Bug Bounty Course here 👉🏼 bugbounty.nahamsec.training 💵 Support the Channel: You can support the channel by becoming a member and get access exclusive content, behind the scenes, live hacking session and more! ☕️ Buy Me Coffee:

https://www.buymeacoffee.com/nahamsec

JOIN DISCORD:

https://discordapp.com/invite/ucCz7uh

🆓 🆓 🆓 $200 DigitalOcean Credit:

https://m.do.co/c/3236319b9d0b

💬 Social Media -

https://twitter.com/nahamsec

-

https://instagram.com/nahamsec

-

https://twitch.com/nahamsec

-

https://facebook.com/nahamsec1

#bugbounty #ethicalhacking #infosec #cybersecurity #redteam #webapp

1🤔 1
Показати все...
5 Methods I Use To Discover APIs

While working on a target, some of the most interesting parts to test is its API. APIs are dynamics, they get updated more often then other…

Hello Hackers 👋! We're thrilled to announce that we've already selected the three lucky winners of our prizes. But before we dive into that, we want to extend a heartfelt thank you to each and every one of you for taking the time to participate in our annual survey. Your valuable feedback is crucial to us as it helps us better understand the needs of our community and provides us with insights to continue improving and adding value. 🍀 Congratulations to all three of you! We'll be reaching out to you shortly to arrange the delivery of your well-deserved prizes. It is the public URL https://app.randompicker.com/protocol/835172x45843 Once again, thank you all for your participation and for helping us make the Bug Bounty Hunter community an even better place Let's keep moving forward together! 🚀 Happy Hunting The Bug Bounty Hunter Team
Показати все...
Random Picker Record: 2024 Bug Bounty Hunter Report (835172)

Click to see the public record of the drawing conducted by RandomPicker.

👍 2
How 18-Year-Old Me Discovered a VirtualBox VM Escape Vulnerability https://j0nathanj.github.io/Dusting-off-the-VM-Escape
Показати все...
How 18-Year-Old Me Discovered a VirtualBox VM Escape Vulnerability

VirtualBox VM Escape Vulnerability - A Research Walkthrough

🤔 3👍 1
Показати все...
The truth about ethical hackers: Are they trustworthy?   - Intigriti

To outmanoeuvre cybercriminals, the key is to beat them to the punch by working with ethical hackers. However, a question often arises: Can we trust ethical hackers? Especially when we don’t know them personally?   Through platforms such as Intigriti, the short answer is yes, you can trust these individuals. However, the word ‘hacker’ carries a […]

1
Показати все...
Making Sense of the Sisense News

CISA issued a warning to CISOs that it was investigating a breach of Sisense. Let's make sense of this breach and what it means for organizations.

Показати все...
How I Exploited an Auth0 Misconfiguration to Bypass Login Restrictions

Auth0 Misconfiguration: Bypassed Login Restrictions. #BugBounty #Security

1
We Hacked Google A.I. for $50,000 - Lupin & Holmes https://www.landh.tech/blog/20240304-google-hack-50000/
Показати все...
We Hacked Google A.I. for $50,000 - Lupin & Holmes

👍 1
Advanced Frida Usage Part 9 – Memory Scanning in Android https://8ksec.io/advanced-frida-usage-part-9-memory-scanning-in-android/
Показати все...
Advanced Frida Usage Part 9 – Memory Scanning in Android - 8kSec

In part-9 of Advanced Frida Usage, learn about API provided by frida called Memory.scan() which can help you to scan bytes from memory & help you to patch them.

👍 1
How we escalated a DOM XSS to a sophisticated 1-click Account Takeover for $8000 - Part 2 https://thefrogsec.github.io/2024/04/06/How-we-escalated-a-DOM-XSS-to-a-sophisticated-1-click-Account-Takeover-for-8000-Part-2/
Показати все...
How we escalated a DOM XSS to a sophisticated 1-click Account Takeover for $8000 - Part 2

This is the second part of our blog series on How we escalated a DOM XSS to a sophisticated 1-click Account Takeover for $8000

2