Mr.MGGaining Control: How Response Manipulation Leads to Higher Privileges (PoC)Greetings, readers! I am Maulik Goti, a Security Analyst👨💻 and Cyber Security Researcher🕵🏻♀️. First, we understand this…4 min read·May 15, 2024----
Mr.MGThe Silent Threat: Uncovering IDOR Vulnerabilities Before They’re Exploited (PoC)Greetings, readers! I am Maulik Goti, a Security Analyst👨💻.4 min read·Apr 29, 2024----
Mr.MGHorizontal Privilege Escalation Attack: Delete Sub-Agent Accounts(POCs)— By Maulik Goti6 min read·Jul 17, 2023----
Mr.MGUnauthorized account access using G-mail verification bypass (POCs)- By Maulik Goti3 min read·Jun 9, 2023----
Mr.MGI am able to Stored HTML Injection on G-mail (POCs)- By Maulik Goti3 min read·Mar 27, 2023--1--1
Mr.MGTypes of Broken Access ControlManual app state modification. These modifications could be URL modification, browser cookies, and sessions, or the use of custom API…5 min read·Mar 26, 2023--1--1
Mr.MGI got a directory listing on the finance web application (POCs).- By Maulik Goti2 min read·Mar 20, 2023----