vulnerabilities

  1. Sauron

    Bug Bounty from Scratch: A comprehensive guide to discovering vulnerabilities and succeeding in cybersecurity

    Embark on your bug bounty journey with essential knowledge and practical skills and contribute to a safer digital landscape Key Features Get started with preparing to participate in a bug bounty program Discover your first bug and claim your reward upon successful detection Go through core...
  2. Mr.Robot

    2 OPEN REDIRECT VULNERABILITIES IN GOVERNMENT SITES

    Open redirect vulnerabilities are generally low scale vulns in sites, heres an article explaining some of the worst ones and how they work, companies have paid thousands for these before! Hidden content
  3. Sauron

    Best Website Hacking/Penetration Testing Course

    What you’ll learn 100+ Videos (10+ hours) to teach you website hacking from scratch. 50+ hands-on real-life website hacking examples - from simple to advanced. Discover, exploit and mitigate a number of dangerous web vulnerabilities. Hack cloud servers using these vulnerabilities. No prior...
  4. Sauron

    Black Hat Hardware Hacking

    For the love of Money - Finding and Exploiting Vulnerabilities in Mobile point of sales systems God Mode Unlocked- Hardware Backdoor I for One Welcome Our New Power Analysis Overloads Last Call for Satcom Security Screaming Channels - When Electromagnetic Side Channels Meet Radio Transceivers...
  5. Sauron

    Ethical Hacking: Vulnerability Research

    What you’ll learn Learn how to find vulnerabilities Learn how to run Exploits Learn about scanning targets Learn basic hacking Requirements No prior requirements Kali Linux installed or Live USB Description You may have heard about vulnerabilities and exploits? Many computers get...
  6. Sauron

    Bug Bounty - An Advanced Guide to Finding Good Bugs

    Bug bounties are evolving year after year and thousands of infosec enthuasiasts are looking to join the boat. Having a great place on that boat requires dedication and investing a great amount of time of work. In fact, there are multiple types of vulnerabilities and mastering the most important...
  7. charlie

    ⚔️ Website Hacking Penetration Testing & Bug Bounty Hunting ⚔️ // 👺🤯 posted by charlie :) 👺🤯

    ⚔️Website Hacking Penetration Testing & Bug Bounty Hunting 👺👺 📋Content: 1️⃣ Chapter 1 2️⃣ Preparation - Creating a Penetration Testing Lab 3️⃣ Preparation - Linux Basics 4️⃣ Website Basics 5️⃣ Information Gathering 6️⃣ File Upload Vulnerabilities 7️⃣ Code Execution Vulnerabilities 8️⃣ Local...
  8. Sauron

    Penetration Testing Using SQL Injection to Recognize the Vulnerable Point on Web Pages

    Web pages vulnerabilities have been exploited since early `90s against user oriented applications such as email, online shopping, and Web banking [1]. Penetration testing is a technique for finding vulnerability or loop holes that exist in web pages which can help for ruling out illegal access...
Top