The program does not deliver or inaccurately releases a resource before it is made available for re-use. the function fails to release a lock it acquires, which might lead to a deadlock.

1. Android SQLite Database

The Android project fails to release the Android database handler in its onPause(), onStop(), or onDestroy() event handlers.An…

A buffer overflow, or buffer overrun, occurs when more extra data is put into a fixed-length buffer than the buffer can manage.

Buffer overflow is possibly the best-known form of software security vulnerability. Most software developers know what a buffer overflow vulnerability is, but buffer overflow attacks corresponding to both…

Open-source intelligence (OSINT) is data collected from publicly available sources to be used in an intelligence context. In the intelligence community, the term “open” refers to overt, publicly available sources (as opposed to covert or clandestine sources).

CREEPY
Most of us are addicted to social networks, and image sharing is one…

Pro Tips For Bug Bounty

1) clear your mindset about bugbounty ( learning > money)

2) Always focus the target as it’s a fresh one

3) Always look at the path less visited. Hunt on subdomain rather than main domain

4) Don’t rely only an online courses and videos. Reading…

MRunal

Blogger | Security Researcher | Digital forensic analyst | Twitter — @mrunal110

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store