I am Back, Sweet Bugs In Smart Contracts: tx.originHello Guys. I am back, I am happy to write to you again after a long time. We haven’t seen most of you for a really long time and yes I…May 31May 31
Hacking Mindset— You Need to Learn TheseHello folks, I am with you again in an article. The topic of today’s article is a topic that is one of the most frequently asked questions…Jan 9, 2024A response icon14Jan 9, 2024A response icon14
I hate Hackerone / X Website Vulnerability — Bug Bounty HunterHello hackers, I hope this will have an impact and that I will not be arrested for this. Have a good readingDec 31, 2023A response icon3Dec 31, 2023A response icon3
Bug Bounty Hunter — Captcha Bypass #Response-to-this-RequestHello folks, I’m back again after a long hiatus. I visited bug bounty masters in the deep valleys of India, I learned many subtleties of…Oct 4, 2023A response icon4Oct 4, 2023A response icon4
Bug Bounty Hunter — Recon is everything / Part 1Hello folks, I’m thrilled to be back after a long hiatus. I’m back, and today I’ll be sharing some valuable insights about Reconnaissance…Sep 2, 2023A response icon3Sep 2, 2023A response icon3
Red Team Member — How to ensure persistence in a system.Hello folks, today we’re going to talk about something interesting. Let’s talk about the subject in conversation at first and then move on…Aug 11, 2023Aug 11, 2023
Red Team Member — Let’s explain the Privilege Escalation with examples / Part 1Hello folks, I hope your week is going well. I’m getting hot and I got my drink again and I wanted to sit in front of the computer and…Aug 8, 2023Aug 8, 2023
Bug Bounty Hunter — Let’s Understand and Recognize IDOR Vulnerability / Part 2Hello Folks, I hope you had a good week. A few health problems, a minor depression caused by the cancellation of my projects that lasted…Aug 4, 2023Aug 4, 2023
Cyber Security Awareness — Recognizing and Understanding Email AttacksHello folks, Today I attended a very nice webinar on email security. It was a great webinar on Email Security and Cyber Security…Jul 13, 2023A response icon1Jul 13, 2023A response icon1
Bug Bounty Hunter — When CORS is not Configured Correctly / JSONP AttackHello Folks, In today’s interconnected web ecosystem, communication and data sharing between websites have become increasingly common…Jul 12, 2023Jul 12, 2023