PinnedPublished inInfoSec Write-upsHow I Found My First High-Severity Bug and Got Rewarded with 3 Trays of Red Bull!Free linkπFeb 24A response icon19Feb 24A response icon19
Published inInfoSec Write-upsLog Me Maybe: When Log Files Leaked Secrets I Wasnβt Meant to See π§Ύπ΅οΈFree Link π1d ago1d ago
Published inInfoSec Write-upsπ Parameter Swap Party: When Flipping POST to GET Broke the App ππ₯Hey there!π3d ago3d ago
Published inInfoSec Write-upsπ¦ Signed, Sealed, Delivered: How I Replayed Signed URLs to Steal Everything βοΈπ£Hey there!π4d ago4d ago
Published inInfoSec Write-upsπ· Forbidden but Not Forgotten: How an HTTP 403 Made Me a Superadmin ππ₯Hey there!π5d agoA response icon15d agoA response icon1
Published inInfoSec Write-upsπ Token Tunnels: How Misused Refresh Tokens Let Me Hijack Sessions Forever π³οΈπ£Hey there!π6d ago6d ago
Published inInfoSec Write-upsβοΈ Cloudy With a Chance of Secrets: How Terraform State Files Exposed the Infrastructure π©οΈπFree Link π6d agoA response icon16d agoA response icon1
Published inInfoSec Write-upsWeak Regex, Big Mess: How I Escaped Input Validation with One Tiny Character ππHey there!πJun 13Jun 13
Published inInfoSec Write-upsHeader Hijinks: How X-Forwarded-For Gave Me Internal Access π§π§ Hey there!πJun 12Jun 12
Published inInfoSec Write-upsOAuth2verdrive: How Broken Token Exchange Let Me Log in as Any User ππ₯Hey there!πJun 11A response icon1Jun 11A response icon1