PinnedPublished inInfoSec Write-upsI reproduced a $10,000 bug🎭 “I wasn’t an admin… until I became one with just a JSON object.”6d agoA response icon26d agoA response icon2
PinnedPublished inInfoSec Write-upsDemystifying Cookies 🍪: The Complete Guide for Bug Bounty Hunters — Part 1Everything you need to know about cookies to expand your attack surface and find real bugs.May 27May 27
PinnedPublished inInfoSec Write-ups🔓 “Before injection, understanding” — What every hacker needs to master before exploiting a NoSQL…Behind every exploit, there’s knowledge. Here’s what to know before injecting.May 19May 19
PinnedPublished inInfoSec Write-ups⏱️ There were no visible errors, no hints… only the server’s hesitation told me the truth.It didn’t scream. It whispered… and I heard it.Apr 26A response icon1Apr 26A response icon1
PinnedPublished inInfoSec Write-ups🔍 How I discovered a hidden user thanks to server responses ?My first real step into web hacking and it wasn’t what i thought it would be.Apr 16Apr 16
Published inInfoSec Write-ups💥 Web Cache Deception — The Vulnerability Even Developers Don’t See ComingExploiting path mapping for web cache deception — a subtle yet powerful technique.1d ago1d ago
Published inInfoSec Write-ups🔐 Cookie Attributes — More Than Just Name & ValueUnderstanding the Security & Scope Behind Every CookieJun 5Jun 5
Published inInfoSec Write-ups🔐 How I bypassed an IP block… without changing my IP?Good protection doesn’t just block — it anticipates. But what if you learn to play by its rules… and win anyway?May 1A response icon1May 1A response icon1
Published inInfoSec Write-upsNothing changed… except for one detail. And that was enough to hackSometimes, hacking doesn’t require any exploit… just good observation.Apr 20Apr 20
Setting up a New Minimal Angular ProjectReviewing the creation flow of an m Angular projectMar 26Mar 26