Sushil ChoudharyMy First Critical VulnerabilityHey Hunters, I am Back with one another find so let's startJul 14, 20244Jul 14, 20244
praveenarsh0xx0Simple Authentication Bypass By Response Manipulation.Hello team , this is praveenarsh a security Researcher and a bug hunter , follow on Instagram @cybersec_praveenarsh. I found a pretty OTP…Aug 4, 20242Aug 4, 20242
Cyb3r M!nds#3. Bug Bounty Series: OTP Verification bypass leads to unauthorized booking appointmentHello guys 👋 I’ve returned with yet another article that is OTP verification Bypass through which I was able to access and do the booking…Jun 25, 20243Jun 25, 20243
byqFrom open redirect to RCE in one weekI will tell you a story of how I chained multiple security issues to achieve RCE on several hosts of the Mail.Ru Group (or VK now).May 31, 20228May 31, 20228
N.I.MRecon Like A BossReconnaissance, or recon for short, is the process of gathering information about a target with the goal of identifying vulnerabilities and…Apr 7, 20239Apr 7, 20239
Nitish_arHow I Bypassed The OTP By Different Method (Part-1)Hello everyone! I’m Nitish, hope you all are doing great. In this, I will share how I found Authentication Bypass.Feb 22, 2023Feb 22, 2023
InInfoSec Write-upsbyHashar MujahidHTTP request smuggling Explained and Exploited Part 0x2Hi! My name is Hashar Mujahid, and today we will continue to discuss what HTTP request smuggling vulnerabilities are and how we can exploit…Oct 20, 2022Oct 20, 2022
InInfoSec Write-upsbyjedus0rIDOR “Insecure direct object references”, my first P1 in BugbountyFirst Whoami : Dris R. A Security Researcher, Penetration Tester from Paris ,France.Sep 5, 20225Sep 5, 20225
InInfoSec Write-upsbyJaydev AhireNo Rate Limit — use like a pro!Hello Folks, Thanks for the Awsome response to my Previous (first) blog.Mar 17, 20213Mar 17, 20213
ice-wzlReptile: The Ultimate Rootkit, Full GuideThere are a variety of Linux rootkits in the wild, however, after testing upwards of 15 none come close to Reptile. Created by the GitHub…Dec 3, 2021Dec 3, 2021
InSystem WeaknessbySwagatHacking JWTThis article is all about pentesting JWT. You can practice all of these techniques on vulnerable target availabe at burp Suite webacademy…Feb 27, 20223Feb 27, 20223
Nassim ChamiHow i made 500$ with XSSHi Hackers, Hope you all are safe. today we have another writeup and it’s about my interesting finding on a private program where I was…Nov 1, 20212Nov 1, 20212
Awez KagdiRemote Code Execution | A Story of Simple RCE on Jenkins Instance.Vulnerability Category: A1- Code InjectionMar 9, 20221Mar 9, 20221
Ruben (Hacker_Yogi)Bug Bounty: Open Xmlrpc.php vulnerability on WordPress site.what is Xml-RPC?Mar 5, 20225Mar 5, 20225