PinnedAccount takeover through Response ManipulationHello everyone, I am back again with another bug. In this blog, I will discuss a bug that I encountered through response manipulation…Jul 12, 2023A response icon1Jul 12, 2023A response icon1
Impostor Admin: Token EditionHello Everyone , I hope you all are doing well. Sorry for not posting any blogs here for a while. So without further delay, let's dive…Apr 16A response icon2Apr 16A response icon2
Leaky Response, Easy Takeover!Happy New Year, everyone! 🎉 I hope you’re all doing great. A huge thank you for 200+ followers – I’m truly grateful that you enjoy my…Jan 8A response icon3Jan 8A response icon3
IDOR : Deleting Comments Like a Boss!Hello everyone, it’s been a while since I last posted some blogs. In this post, I’m going to share how I found IDOR (Insecure Direct…Aug 28, 2024A response icon2Aug 28, 2024A response icon2
How I found my First Valid bugHello everyone! I am really happy to announce that I got my first valid bug from a target, and not only that, I uncovered two bugs from…Apr 23, 2024A response icon10Apr 23, 2024A response icon10
Logical Error leads to DOS for victimHappy new year everyone . I hope you all are doing good . Let’s discuss about my first bug of 2024 which was closed as NA. It’s really sad…Jan 14, 2024A response icon2Jan 14, 2024A response icon2
Exploiting Exposed .git File to Access Webmail CredentialsHello everyone, I’m back with a new bug. I discovered this issue on a domain that offers free internships to everyone. Despite the absence…Nov 22, 2023A response icon1Nov 22, 2023A response icon1
Uncovering Hidden Likes through Parameter ManipulationHello everyone, welcome back to yet another blog. Thank you so much for showing your love in my previous post. Without any further delay…Aug 10, 2023A response icon1Aug 10, 2023A response icon1
Inside the Invite Function: Uncovering a Potential Vulnerability of Invite UserHello everyone, I hope you are all doing well in your lives. In this blog, I will discuss a business logic flow I found in an invite…Jun 30, 2023A response icon3Jun 30, 2023A response icon3
Unauthorized access to the Projects | Bug BountySo hello everyone, this is my first medium blog and first blog on bug hunting . So,without any delay, let’s move to today’s blog.Jun 2, 2023Jun 2, 2023