PinnedHow i Found Valid Bug in Indian Government Website ??Free Link:- https://medium.com/@securityinsights/abfd736e55e3?source=friends_link&sk=cc307ffeef1e94ab8cf0f778fc58e9caFeb 5A response icon1Feb 5A response icon1
PinnedPublished inMeetCyberPassword Reset Endpoint (Part 1)|| Easy Bug #4 $$$Free Link:- https://medium.com/@securityinsights/661ba670b24b?source=friends_link&sk=cd7337cccc28133d0320fddd90af2019Feb 5A response icon1Feb 5A response icon1
PinnedPublished inSystem WeaknessHow i find sensitive files in 2 minutes|| Easy Bug #2 $$$Free Link:- https://medium.com/@securityinsights/d53965b7e4f4?source=friends_link&sk=771cd6e71dfa8cb4648111100a11d47aJan 23A response icon4Jan 23A response icon4
PinnedPublished inMeetCyberHow I Found CRLF in 2 minutes || Easy Bug #1 $$$Free LinkJan 22A response icon3Jan 22A response icon3
PinnedPublished inMeetCyberHow I Hacked NASA & Got a Hall-Of-Fame Acknowledgement - 2025Jan 12A response icon14Jan 12A response icon14
Published inSystem WeaknessHow i found 3 Bugs in 10 minutes || Easy bugs #5 $$$Free Link:- https://medium.com/@securityinsights/8b80b4966560?source=friends_link&sk=008d0be5597868e351ea1c8ef74edad2Feb 19A response icon5Feb 19A response icon5
Published inMeetCyberExposed JBOSS JMX Management Console — Shutdown the Website ||Advanced Dorking (Part 1)Disclaimer: 🛡️ This blog is for educational purposes only. Use tools ethically with explicit permission of Organization or Application…Feb 18Feb 18
Published inSystem WeaknessHacking a News Website — CVE-2023–38205: Adobe ColdFusion Access Control BypassFree Link:- https://medium.com/@securityinsights/5f1050c9b6f9?source=friends_link&sk=08b45e12796b69baff0c014ad3821b52Feb 6A response icon1Feb 6A response icon1
Published inSystem WeaknessHow i Hacked into My College Website ??Free Link:- https://medium.com/@securityinsights/91227145feec?source=friends_link&sk=6a527aa260b7371b24f14a8fee81d93cJan 31Jan 31
DeepSeek Database Exposed , Leaking Sensitive Information along with Chat HistoryUnderstand How DeepSeek public infrastructures allowed unauthorized full control over database operations, including access to internal…Jan 30Jan 30