PinnedDaniel "V" MoraisinInfoSec Write-upsSome critical vulnerabilities found with passive analysis on bug bounty programs explainedThis post describes three vulnerabilities found on paid bounty programs along with an overview about how it was found and the performed…Mar 7, 20223Mar 7, 20223
Daniel "V" MoraisinInfoSec Write-upsBusiness logic flaw in invitation system allows to Takeover any account at private companyWeb application Vulnerability WriteupJun 15, 20201Jun 15, 20201
Daniel "V" MoraisinInfoSec Write-upsBanner Grabbing to DoS and Memory CorruptionBanner Grabbing to DoS and Memory Corruption on IIS serverApr 16, 2019Apr 16, 2019
Daniel "V" MoraisinInfoSec Write-upsBypassing rate limit abusing misconfiguration rulesHello Friends,Feb 15, 20197Feb 15, 20197
Daniel "V" MoraisinInfoSec Write-upsWhen Cookie Hijacking + HTML Injection become dangerousHello Friends,Jan 7, 2019Jan 7, 2019
Daniel "V" MoraisinInfoSec Write-upstaking over google calendar of a companyHello Guys!Dec 4, 20181Dec 4, 20181
Daniel "V" MoraisinInfoSec Write-upsFrom Security Misconfiguration to Gaining Access of SMTP serverHello Guys!Nov 18, 2018Nov 18, 2018