5 Key Factors to Help You Choose the Best Bug Bounty Program on HackerOneDiscover the secrets to finding programs that pay well, respond quickly, and value your skills.Sep 27, 2024Sep 27, 2024
Broken Authentication Leads to the Ability to Unsubscribe Other Users' RemindersIn this post, I will show you how I discovered a Broken Authentication vulnerability at the Reminders Unsubscribe endpoint.Sep 4, 20241Sep 4, 20241
IDOR at the Get Payment Data Endpoint Leads to Personal Identifiable Information (PII) DisclosureIn this post, I will show you how I discovered an Insecure Direct Object Reference (IDOR) vulnerability at the Get Payment Data endpoint.Jul 17, 20241Jul 17, 20241
Broken Access Control (IDOR) & Credential Leak at Legacy API Video TranscodeIn this post, I will show you how I discovered a broken authentication and authorization vulnerability, known as IDOR.May 15, 20242May 15, 20242
Race Condition on Change Email Leads to Arbitrary Email ForgeryIn this post, I will show you how I discovered a vulnerability that allows a malicious user to change their email to an unregistered email.Apr 19, 20246Apr 19, 20246
Broken Access Control (IDOR) on Forgot Password Could Lead to Attacker Change Password for Every…Hello everyone,Apr 12, 20244Apr 12, 20244
Published inOSINT TeamGit Directory Exposed Leads to Credentials DisclosureHello everyone,Jan 24, 20243Jan 24, 20243
How I Helped Indonesian Startup Company to Prevent Millions of PII Data LeaksHello everyone,Jan 10, 20242Jan 10, 20242