Aditya SoniHow I approached Dependency Confusion!Hi People, In this blog, I will be sharing my approach for finding Dependency Confusion bugs.Jan 31, 20226Jan 31, 20226
rvdtSecStory: How I Found Multiple P1 Vulnerabilities without ReconHello everyone. Nowadays, there are numerous bug hunting stories on the internet. For me, I’ve dubbed my experiences as my “SecStory,”…Jul 23, 20222Jul 23, 20222
InThe StartupbyVickie LiHacking Git DirectoriesHow to reconstruct source code from an exposed .git directoryDec 25, 20191Dec 25, 20191
InPentester Academy BlogbyShivam BathlaAPI5:2019 — Broken Function Level Auth IIHello all, today we will be looking into OWASP API Security Top 10’s another vulnerability, i.e. Broken Function Level Authorization.Jul 29, 2020Jul 29, 2020
InInfoSec Write-upsbyTuhin BoseLog4shell Zero-Day Exploit— Full GuideHello guys! My name is Tuhin Bose (@tuhin1729). I am a cyber security researcher and bug bounty hunter. In this write-up, I am going to…Dec 14, 20215Dec 14, 20215
Pranay BafnaTCAPT: DLL HijackingHello Hackmates, I’ve been learning about Thick Client Application Penetration Testing and recently, came up with the topic: DLL Hijacking…Nov 24, 2021Nov 24, 2021
Aditya VermaPeeping through a Web-SocketRecently, I had found a bug related to web sockets through which I was able to view all the messages being sent to the victim user.Nov 20, 2021Nov 20, 2021
Sushant KambleHow I found Command Injection via Obsolete PHPThumb P1 vulnerabilityHello Readers, after a great response to my previous write-up on Account Takeover Chained to Host Header Injection. I would like to thank…Oct 30, 20213Oct 30, 20213
Priyansh BansalUnauthenticated Cache PurgeHello everyone, I am Priyansh and this is my first writeup. Today I will be discussing a vulnerability that I found in one of the…Oct 27, 20211Oct 27, 20211
Gnana Aravind KBypassing a payment gateway for FUN 🙂Good day ppl ! This is Gnana Aravind, with a new write-up on how I bypassed the payment gateway of a website and made my payment…Sep 9, 20214Sep 9, 20214
Youssef A. MohamedEscalating SSRF to RCEEscalating SSRF to RCE in AWS Elastic BeanstalkMar 12, 20192Mar 12, 20192
InInfoSec Write-upsbyTuhin BoseAccount Takeover via Access Token LeakageHello guys! My name is Tuhin Bose (@tuhin1729). I am a cyber security researcher and bug bounty hunter. In this write-up, I am going to…Aug 19, 2021Aug 19, 2021
InInfoSec Write-upsbyEfren DiazFind real website ip bruteforcing ipv4 rangesToday many web applications are protected behind services such as Cloudfare, Akamai, etc… hiding their real ip address and this can be an…Aug 17, 2021Aug 17, 2021
InInfoSec Write-upsbyKeshav KhannaFundamentals of SIEMThis blog is for those people who are interested in working on any Siem tool.Aug 11, 20212Aug 11, 20212
viral bhattBypass Google Captcha+Parameter Pollution Leads to send email to any user on behalf of…Hi folks, I am Viral Bhatt. This is my first write-up so there might be possibilities of numerous mistakes but yeah it’s okay to make…Aug 13, 20213Aug 13, 20213
InInfoSec Write-upsbyManas HarshWAF bypasses: Tearing down the wallBefore we go deep into the ACTUAL bypasses section, It’s really important to understand what is a WAF(Web application firewall) and it’s…Aug 12, 2021Aug 12, 2021
InInfoSec Write-upsbycan1337What is BOLA? 3-digit bounty from Topcoder ($$$)This write-up will be about Broken Object Level Authorization (BOLA), which is #1 topic of API Security 101 (OWASP).Aug 9, 2021Aug 9, 2021