How to Find and Exploit Jenkins Unauthenticated RCE via ShodanJenkins Unauthenticated Remote Code Execution ⛓️💥3d ago3d ago
How to manually hunt for F5 Big-IP RCE (CVE 2020–5902, CVE2022–1388)Manual testing steps with shodan dork and python script to test via terminal.Jun 8A response icon2Jun 8A response icon2
How to find Jupyter Notebook RCE manually?Unauthenticated Remote Code Execution in Jupyter Notebook ⛓️💥Jun 1A response icon1Jun 1A response icon1
How I Hijacked an Instagram Account and Discovered Open Redirection VulnerabilitiesBroken link hijacking & Open redirect 🧑🏽💻Mar 10A response icon3Mar 10A response icon3
How I Found a Bug in Sony and Earned Exclusive Swag!👨🏽💻Jan 23A response icon11Jan 23A response icon11
CSRF On Delete Profile: High Severity(7.1) HackerOne👨🏽💻Dec 20, 2024A response icon6Dec 20, 2024A response icon6
Vote Manipulation & Debug Exposure, Another Interesting Finding…My duplicate bug on BBC 🥲Dec 9, 2024Dec 9, 2024
How To Find Sensitive Log Files Easily..My Information Disclosure In Brazilian Government.Dec 5, 2024A response icon1Dec 5, 2024A response icon1
My Second BountyNo input validation on Firstname section leads to Html Injection.Nov 23, 2024Nov 23, 2024
Sensitive Information Disclosure Which Got My First Bounty💸Nov 15, 2024A response icon1Nov 15, 2024A response icon1