Skip to content

SECRY

#1 Cyber [SEC]urity Sto[RY] - News & Bug Bounty Story Collections

SECRY

#1 Cyber [SEC]urity Sto[RY] - News & Bug Bounty Story Collections

  • HOME
  • ABOUT
  • Contact Admin
  • BUG BOUNTY
  • NEWS
  • Cyber Security
  • Tips and Tricks
  • Tools
  • Disclaimer
Bug Bounty Tips and Tricks

About Bug Hunter, Bug Bounty Program and Tips for Creating Effective Vulnerability Reports

Christin Apr 11, 2023
Bug Bounty SSRF XSS

XSS to RCE: How Bug Hunter Escalating XSS to Read Local File System via PDF

Christin Apr 6, 2023
Cyber Security News Takeover

Linus Tech Tips YouTube Channel Hacked and Deleted: Malware Analyst Share Malware Analysis and Preventive Measures

Christin Apr 1, 2023
Cyber Security News

Critical WooCommerce Payments Plugin Flaw: Authentication Bypass & Privilege Escalation

Christin Mar 25, 2023
Cyber Security News

Critical Microsoft Word RCE Vulnerability Proof-of-Concept Released

Christin Mar 23, 2023
Bug Bounty Tips and Tricks

About Bug Hunter, Bug Bounty Program and Tips for Creating Effective Vulnerability Reports

Christin Apr 11, 2023

Before we delve into the main explanation of creating Effective Vulnerability Report with additional explanations about Bug Hunter and Bug Bounty Program, there is a disclaimer and basic explanation about…

Bug Bounty SSRF XSS

XSS to RCE: How Bug Hunter Escalating XSS to Read Local File System via PDF

Christin Apr 6, 2023

What is XSS (Cross-Site Scripting) to Local File Read Vulnerability? Before we delve into the write-up about the escalation of XSS to RCE, let's first understand what XSS is. XSS…

Cyber Security News Takeover

Linus Tech Tips YouTube Channel Hacked and Deleted: Malware Analyst Share Malware Analysis and Preventive Measures

Christin Apr 1, 2023

A High-Profile Channel Hacked Linus Tech Tips YouTube Channel Hacked and Deleted. Linus Tech Tips is a tech YouTube channel with over 15 million subscribers, was recently hacked, which led to…

Cyber Security News

Critical WooCommerce Payments Plugin Flaw: Authentication Bypass & Privilege Escalation

Christin Mar 25, 2023

Overview A critical vulnerability has been discovered in the WooCommerce Payments plugin, which is installed on over 500,000 WordPress websites. The vulnerability, if not resolved, could allow unauthorized attackers to…

Cyber Security News

Critical Microsoft Word RCE Vulnerability Proof-of-Concept Released

Christin Mar 23, 2023

Overview of CVE-2023-21716 CVE-2023-21716 is a severe heap corruption vulnerability discovered in Microsoft Word's RTF parser. This vulnerability, when exploited, allows remote attackers to execute code with the same privileges…

Bug Bounty Bypass

70000 US Dollar Google Pixel Lock Screen Bypass Vulnerability: Explanation

Christin Mar 16, 2023

This article explains the write-up of an individual who successfully discovered the Google Pixel Lock Screen Bypass bug, which is identified as CVE-2022-20465. But before that, let's first understand the…

Cyber Security Tips and Tricks

Convert Cyber Security Into MONEY

Christin Mar 13, 2023

Cybersecurity is one of the most rapidly growing areas in the technology industry today. In this digital age, it's crucial for businesses and organizations to safeguard their systems and valuable…

Bug Bounty Tips and Tricks Tools

AllAboutBugBounty Repository: A Comprehensive Guide to Bug Bounty Hunting

Christin Mar 8, 2023

What is AllAboutBugBounty Repository? The AllAboutBugBounty repository on Github, created by Muhammad Daffa from Indonesia, a vulnerability researcher at spiderSilk, has gained significant attention from the cybersecurity community. With 782…

Cyber Security Tools

Nuclei Malware: A New Tool for Malware Researchers

Christin Mar 7, 2023

What is Nuclei? Before we explain about Nuclei Malware, lets try to understand about NUCLEI. NUCLEI is a powerful open-source tool widely used for discovering security vulnerabilities in web applications.…

Bug Bounty Takeover

Bughunter Hack BBC UK MAIL Servers: How Chained Vulnerabilities and Get HOF

Christin Feb 23, 2023

What is Mail Server Takeover ? Mail Server Takeover is a type of security vulnerability that allows attackers to gain unauthorized access to a mail server and take control. This…

Posts navigation

1 2 … 4

Next Page »

Follow our Youtube Channel

Categories

  • Bug Bounty
  • Bypass
    • File Upload
  • CRLF Injection
  • CSRF
  • Cyber Security
  • DOS
  • HTTP Request Smuggling
  • IDOR
  • News
  • RCE
  • Sensitive Data Exposure
  • SSRF
  • Takeover
    • Account Takeover
    • Subdomain Takeover
  • Tips and Tricks
  • Tools
  • XSS

About this site

This website contains a Collections of WRITE UP + PDFs of original stories from Bug Hunter, Hacking News around the World of Cyber Security and Ethical Hacking.  Readmore here.

Tags

Account Takeover AllAboutBugBounty Apple Inc. Authentication Bypass BBC News Bug Bounty Career CVE-2023-21716 Cyber Security Data Breached Effective Reports Email System File Upload Github Repository google Google Pixel Hall Of Fame HOF instagram Learning Linus Tech Tips Local File Read Lock Screen Bypass Mail Server Takeover Malware Microsoft Microsoft Services NFT Music Marketplace Nuclei Template P4 to P1 Privilege Escalation Rahul Maini rce RedLine Stealer Sensitive Data Exposed shopify Store Takeover Subdomain Takeover Tips Tips and Tricks Virus Vulnerability Report xss XSS hunter XSS To RCE
About Bug Hunter, Bug Bounty Program and Tips for Creating Effective Vulnerability Reports
Apr 11, 2023
About Bug Hunters, Bug Bounty Program and Tips for Creating Effective Vulnerability Reports
XSS to RCE: How Bug Hunter Escalating XSS to Read Local File System via PDF
Apr 6, 2023
XSS TO RCE: Local File Read
Linus Tech Tips YouTube Channel Hacked and Deleted: Malware Analyst Share Malware Analysis and Preventive Measures
Apr 1, 2023
Linus Tech Tips YouTube Channel Hacked
Critical WooCommerce Payments Plugin Flaw: Authentication Bypass & Privilege Escalation
Mar 25, 2023
WooCommerce Payments Plugin Flaw: Authentication Bypass and Privilege Escalation

SECRY

#1 Cyber [SEC]urity Sto[RY] – News & Bug Bounty Story Collections

Copyright © 2022 secry.me All rights reserved | Made by gho5t.

  • About
  • Contact Admin
  • Privacy Policy Secry.me
  • Disclaimer