tRPC Security Research: Hunting for Vulnerabilities in Modern APIsIn this write-up, I want to discuss my research on tRPC. Initially, we will review the concepts of tRPC before proceeding to analyse the…Jan 12, 20242Jan 12, 20242
Identity-Aware Proxy Misconfiguration- Google Cloud VulnerabilityFirst, we need to know what Identity-Aware Proxy (IAP) is and how it works to exploit it…Jan 6, 20232Jan 6, 20232
Published inInfoSec Write-upsUnauthorized Access to OData Entities + $2K Bounty From MicrosoftHi, this post is about one of the vulnerabilities I found from Microsoft.Jan 10, 20211Jan 10, 20211