AjakCybersecurityAn Email Authentication Bypass, But Marked as N/A in NASA domain😢Thank you for 2K Followers, keep showing love :) Hi, Ajak Amico’s welcome back to another blog. Today I will explain, How I found an Email…4 min read·5 days ago----
AjakCybersecurityExploiting JWT Token Leads To IDOR🔃Hi, Ajak Amico’s welcome back to another blog today. In this blog, I will show how I found an IDOR vulnerability by exploiting JWT token…5 min read·May 9, 2024--4--4
AjakCybersecurityHow I Bypassed Rate limiting To Account TakeoverHi, Ajak Amico’s welcome back to another blog today. In this blog, I will show how I found rate limit bypass using IP rotation which led to…4 min read·May 3, 2024--1--1
AjakCybersecurityFind PII Info Disclosure Bugs With this Simple GUI Tool-Easy P1😍Thank you for 2K Followers, keep showing love :) Hi, Ajak Amico’s welcome back to another blog today. One of my subscriber hit me this…6 min read·Apr 29, 2024--3--3
AjakCybersecurityFind This Easy CSRF in Every Website- A Sweet P4🔥Thank you for 2K Followers, keep showing love :) Hi, Ajak Amico’s welcome back to another blog. Today I will explain how I found an Easy…5 min read·Apr 25, 2024--1--1
AjakCybersecurityI Found An IDOR Flaw where users' attached pictures and documents were leaked.Thank you for 2K Followers, keep showing love :) Hi, Ajak Amico’s welcome back to another blog. I will explain how I found an IDOR…4 min read·Apr 16, 2024--2--2
AjakCybersecuritySecret BurpSuite Extension For BugBounty~ Part-2Hi, Ajak Amico’s welcome back to another blog today. In this blog, I will show the secret bug bounty extensions I use for bug bounty part…4 min read·Apr 11, 2024--1--1
AjakCybersecurityIDOR To view other private users profile pictures in un.orgHi, Ajak Amico’s welcome back to another blog. I will explain how I found IDOR vulnerability which led to see other private user's profile…3 min read·Apr 5, 2024----
AjakCybersecurityFake Tinder Account Verified By Bypassing Face Authentication💀Hi, Ajak Amico’s welcome back to another blog. So recently I came across a reel on Instagram where the user complained that someone used…5 min read·Mar 31, 2024--1--1
AjakCybersecurityMistakes To Avoid in Your Bug Bounty Career- Part 2Hi, Ajak Amico’s welcome back to another blog. Today, I will share the bug bounty mistakes, which would destroy your career, if you haven't…4 min read·Mar 27, 2024--1--1