Inside the Router: How I Accessed Industrial Routers and Reported the FlawsRouter Vulnerability Hunt, From Google Dorks to Firmware Emulation — The Full StoryOct 1, 20233Oct 1, 20233
Facebook bug: A Journey from Code Execution to S3 Data LeakA Tale of Two Threats: OS Command Injection and Data Leak in Meta’s (formerly Facebook) Careers PlatformFeb 16, 20233Feb 16, 20233
Cracking Online Test/Quiz Software: Attack and DefenseIn this blog, I will demonstrate how easily anyone can crack online test/quiz software if it is poorly developed.Dec 25, 2022Dec 25, 2022
Remote Command Execution in a Bank ServerA detailed article on how I exploited Remote Command Execution (RCE) with the help of the Vulnerability Chain.Nov 18, 20224Nov 18, 20224
How I made $31500 by submitting a bug to FacebookHow did I found SSRF in Facebook — the story of my first bug bountyMay 31, 202034May 31, 202034