Talk and help about bugbounty
https://hackingblogs.com/tiktok-hacked-972528-passwords-at-risk-in-leak
Читать полностью…https://hackingblogs.com/supercard-x-2025s-most-dangerous-android-malware/
Читать полностью…My reports are closed by saying that they are constantly informative or do not have any critical effects, information leakage is present in the categories, but triyaj teams close it as information, which I don't understand, does the information leak necessarily have to be user, personnel or personal data, so isn't the leakage of system data a security vulnerability, if anyone has an idea of a solution to this issue, I would be very happy if you could tell me. We can access any services within the program, I can keep up with the login screens of the services, I can access the domains of the personnel's e-mail addresses, the last four digits of their phone numbers, aren't these a valid security vulnerability, it is very uncomfortable to constantly close them informatively, please help
Читать полностью…I found the relaysms .io website to be very useful for delivering bulk sms Messages to different countries.
Читать полностью…https://www.instagram.com/cyber__quantum?igsh=NzJ0b2VyNndiNGQ2
Follow this account for cybersecurity related reels and post
Any legit partner for cracking crypto wallet pin DM
Читать полностью…https://hackingblogs.com/shocking-discovery-samsung-phones-exposed/
Читать полностью…https://hackingblogs.com/fake-whatsapp-telegram-preinstalled-on-android/
Читать полностью…Anyone looking for cybersecurity tutorials like
Soc Analyst
Vapt
Splunk Admin
Qradar Admin
Pentesting
Can ping for complete resources like videos docs and interview questions
https://hackingblogs.com/the-famous-4chan-was-hacked-source-code-is-leaked
Читать полностью…https://hackingblogs.com/stop-torrenting-until-you-do-this
Читать полностью…do anyone have Aws account i just want to check subdomain takeover bug
Читать полностью…Being able to see the domain of the email and last 4 digits of phone number isn't a valid bug. Unless you can get the full email and phone number.
Читать полностью…https://hackingblogs.com/ilexipol-leaks-what-police-dont-want-you-to-see
Читать полностью…Does anyone have Turbo Intruder script to perform Cluster Bomb in Burp Suite? It'll be great help if you share it. TIA.
Читать полностью…Hello guys,
I have published a new writeup on bugbounty.
Have a read: https://vijetareigns.medium.com/business-logic-flaw-worth-1250-35efcd1b9af9
Do clap and share if you like it. Follow for more
Hey guys, Please hàs anyone here tried relaysms .io Gateway software?
Читать полностью…Hola buenas , necesito de alguien que sepa sobre auditoría informática y me oriente que herramientas fuera de Nessus, Zenmap pueda yo buscar para que me ayuden a encontrar fallas de seguridad y vulnerabilidad en los equipos , en la red , en los puertos
Читать полностью…https://www.instagram.com/cyber__quantum?igsh=NzJ0b2VyNndiNGQ2
Follow this account for cybersecurity related reels and post
Deep talks, no small talk.
A stranger you can talk to without filters.
Let’s vibe, listen, and heal in silence or words. and Not here to impress, just here to understand.
If you feel heavy, lost, or overthinking — let’s talk. (ASTOLOGER AND A PHYSOLOGIST )
Please send me a step by step PDF of Bug Bunty from the real website
Читать полностью…