Karthikeyan.VinInfoSec Write-ups📸 Let’s see how easy it is to hack someone’s drone camera and get live video access. 🚁I still remember when I was a kid, I was eager to buy a drone and an RC helicopter. My interest in buying a drone wasn’t just to play with…Feb 20Feb 20
Karthikeyan.VinInfoSec Write-upsUnmasking Vulnerabilities: Exploring the Convergence of Robotics and Cybersecurity🤖 What if a cyber attack happened to robotics? 🤔Aug 16, 2023Aug 16, 2023
Karthikeyan.VinInfoSec Write-upsNavigating Uncharted Waters: The Cybersecurity Implications of Maritime Vessel HackingWe often find thrill in hacking software and hardware, but have you ever wondered about hacking a submarine or a vessel? The intrigue…Aug 16, 2023Aug 16, 2023
Karthikeyan.VinInfoSec Write-upsTaking Entire server control Part 2 of How I Earned $2500 in 5 Minutes | CVE-2017–5638 | OGNL…Hello, Infosec fam! Welcome to Part 2 of our series on Unleashing the Power of Recon: How I Earned $2500 in 5 Minutes | CVE-2017–5638 |…Jun 27, 20231Jun 27, 20231
Karthikeyan.VinInfoSec Write-upsUnleashing the Power of Recon: How I Earned $2500 in 5 Minutes | CVE-2017–5638 | OGNL injectionThe Swift Path from Recon to Remote Code Execution (RCE)Jun 16, 20233Jun 16, 20233
Karthikeyan.VinInfoSec Write-upsReady to Dive Into Bug Bounty? Follow the Roadmap I Crafted! 🐛💰Introduction: Bug bounty programs have gained significant popularity in the cybersecurity community, offering exciting opportunities for…Jun 13, 2023Jun 13, 2023
Karthikeyan.VinInfoSec Write-upsHacking WhatsApp with tiny little hardware | Unveiling the Mac OS Security Myth: Exploiting…Is your Mac OS really safe? Explore how a custom-built HID-based device can trigger WhatsApp messages without your knowledge, highlighting…Jun 9, 2023Jun 9, 2023
Karthikeyan.VinInfoSec Write-upsHacking Top Website accounts | Poseidon: Empowering Phishing with a Cloud-Based Social Engineering…A cloud-based social engineering tool revolutionizing phishing attacks with its GUI, extensive templates, and easy installation.Jun 9, 2023Jun 9, 2023
Karthikeyan.VinInfoSec Write-upsTurning My Manual Methodology to a Cloud-Based GUI Tool for Web Recon | Ghost Recon Your Ultimate…👋🏽 Hello, fellow tech enthusiasts! If you have a keen interest in deep web recon and automation, I’m excited to introduce you to my…Jun 7, 20231Jun 7, 20231
Karthikeyan.VinInfoSec Write-upsTurning Vulnerability into Bounty: How CVE-2020–17453 XSS Earned Me a $500 BountyHi there! As an avid bug bounty hunter, I always look forward to weekends to participate in different programs and discover vulnerabilities…Apr 20, 2023Apr 20, 2023