Published inOSINT TeamAlert: Reflected XSS Detected 👽Hello Hackers, Today in this write-up I am going to tell you how I bypass WAF and found 3 RXSS vulnerability in the same domain with the…4d ago14d ago1
Published inOSINT TeamBypassing File Upload Defenses: My Journey from Simple Bypass to Near RCEHello Hackers, Today in this write-up I am going to tell you how I am able to bypass file upload restrictions to upload php or any files…Oct 271Oct 271
Cracking ATO via Email HTML InjectionHello hackers, today in this write-up I am going to share how I find HTML injection in email in one of the self hosted target. And to show…Oct 12Oct 12
Chaining Application-Level DoS with CSRF: A Sneaky Exploit to Block User LoginsHello Hackers, In this writeup I am going to discuss how I chained application level dos with csrf to restrict users to login to their…Oct 1Oct 1
Published inOSINT TeamPassword Reset Flaws: Key Methods for Finding VulnerabilitiesHello Hackers, In this writeup I am going to discuss some methods to hunt on Password Reset Functionality. When you are testing this…Sep 122Sep 122
Advanced Web Cache Poisoning Techniques (Part 2): Tools, Methods, and ExploitsHello hackers, Today in this writeup I am going to tell you some techniques to find web cache poisoning with their resources and all the…Aug 21Aug 21
Unraveling Web Cache Poisoning: A Deep Dive (Part 1)hello hackers, Today in this writeup I am going to tell you all about web cache poisoning which I have learn through almost 3 weeks of…Aug 7Aug 7
How I Found 3 Bugs in a Single DayIn this write-up, I will share my journey of discovering my first high-severity bug and making it to the Hall of Fame (HOF). I’ll take you…Jun 21Jun 21
Published inOSINT TeamFinding IDOR Vulnerabilities: Key Endpoints and ResourcesHello there, I am Dishant. Today, in this article, I am going to share some common endpoints where you can search for IDOR vulnerabilities…Jun 121Jun 121