LarebSQL Injection in 5 mins //Just because of CURIOSITY //Assalamu alaekum gentlemen, I am happy to share that I found a SQL Injection in one of the web application of college . I was able to…2d ago
Mukund BhuvaHow I Hacked the Dutch Government: Exploiting an Innocent Image for Remote Code ExecutionPwning the Dutch Government with RCEFeb 129
Sugam DangalInformation Disclosure that made me $2000 in under 5 minutesOn May 15 2024 , It was 3 am while i was trying to fall asleep but i couldn’t. A random thought came into my mind that i should try…Jul 196Jul 196
mrhavitBreaking TikTok: Our Journey to Finding an Account Takeover VulnerabilityHello, fellow security researchers and bug bounty hunters!Jun 4, 202311Jun 4, 202311
LarebSQL Injection in 5 mins //Just because of CURIOSITY //Assalamu alaekum gentlemen, I am happy to share that I found a SQL Injection in one of the web application of college . I was able to…2d ago
Mukund BhuvaHow I Hacked the Dutch Government: Exploiting an Innocent Image for Remote Code ExecutionPwning the Dutch Government with RCEFeb 129
Sugam DangalInformation Disclosure that made me $2000 in under 5 minutesOn May 15 2024 , It was 3 am while i was trying to fall asleep but i couldn’t. A random thought came into my mind that i should try…Jul 196
mrhavitBreaking TikTok: Our Journey to Finding an Account Takeover VulnerabilityHello, fellow security researchers and bug bounty hunters!Jun 4, 202311
Jonathan MondautHow ChatGPT Turned Me into a HackerDiscover how ChatGPT helped me become a hacker, from gathering resources to tackling CTF challenges, all with the power of AI.Jun 188
BrownBearSecWhat I learnt from reading 217* Subdomain Takeover bug reports.A comprehensive analysis of Subdomain Takeovers (SDTO), DNS Hijacking, Dangling DNS, CNAME misconfigurations…Oct 31, 20224