PinnedPublished inInfoSec Write-upsSome critical vulnerabilities found with passive analysis on bug bounty programs explainedThis post describes three vulnerabilities found on paid bounty programs along with an overview about how it was found and the performed…Mar 7, 2022A response icon3Mar 7, 2022A response icon3
Published inInfoSec Write-upsBusiness logic flaw in invitation system allows to Takeover any account at private companyWeb application Vulnerability WriteupJun 15, 2020A response icon1Jun 15, 2020A response icon1
Published inInfoSec Write-upsBanner Grabbing to DoS and Memory CorruptionBanner Grabbing to DoS and Memory Corruption on IIS serverApr 16, 2019Apr 16, 2019
Published inInfoSec Write-upsBypassing rate limit abusing misconfiguration rulesHello Friends,Feb 15, 2019A response icon7Feb 15, 2019A response icon7
Published inInfoSec Write-upsWhen Cookie Hijacking + HTML Injection become dangerousHello Friends,Jan 7, 2019Jan 7, 2019
Published inInfoSec Write-upstaking over google calendar of a companyHello Guys!Dec 4, 2018A response icon1Dec 4, 2018A response icon1
Published inInfoSec Write-upsFrom Security Misconfiguration to Gaining Access of SMTP serverHello Guys!Nov 18, 2018Nov 18, 2018