PinnedAjay NaikinInfoSec Write-upsInsider Secrets to Earning $100 to $250 in Bug BountiesMethodology:Sep 21Sep 21
PinnedAjay NaikinOSINT TeamDeploying Honey Pots to Trap Hackers on Your WebsiteDeploying a honey pot on your website is a security technique used to identify and monitor potential attackers attempting unauthorized…Sep 16Sep 16
PinnedAjay NaikinInfoSec Write-upsTop Reconnaissance Tools for Ethical Security TestingIntroductionSep 10Sep 10
PinnedAjay NaikinInfoSec Write-upsGoogle Safe Browsing Blacklisting Due to Website CompromiseWhen a website is compromised, it becomes a potential threat to visitors, leading to its inclusion in Google’s Safe Browsing blacklist…Aug 313Aug 313
PinnedAjay NaikinInfoSec Write-upsWhat is WAF? & Secret Techniques to Bypass ItWAF (Web Application Firewall): A tool designed to filter and monitor HTTP/HTTPS traffic, preventing attacks on web applications at the…Sep 5Sep 5
Ajay NaikCVE-2024–25600: WordPress Bricks Builder Remote Code Execution Vulnerability -$$$$ BOUNTYOverview:1h ago21h ago2
Ajay NaikSands of Time: Finding Clarity Alone on the BeachThe beach has always possessed a special kind of magic — a place where the land gently kisses the sea, and the chaos of everyday life…1d ago1d ago
Ajay NaikinInfoSec Write-upsCritical Vulnerabilities in porte_plume plugin to Remote Exploits -$$$$ Bounty -CVE-2024–7954Bounty | CVE-2024–7954 | Remote code execution | Critical | Vulnerability2d ago2d ago
Ajay NaikinInfoSec Write-upsHigh-Risk Vulnerabilities in Apache HTTP Server’s mod_proxy Encoding Problem Allow Authentication…Bounty -CVE-2024–384732d ago2d ago
Ajay NaikAI Tools For Automating Daily TasksAI tools are revolutionizing various industries, offering solutions for automation and advanced analytics, streamlining tasks, boosting…3d ago3d ago