PinnedPublished inNerd For TechBreaking Application’s Logic to DOS AttackHey guys, Recently I had found a bug which was fine enough to deserve this post. So, I thought of writing it up here. I can not disclose…Sep 2, 2021Sep 2, 2021
PinnedPublished inInfoSec Write-upsIDOR on API endpoints.Hey guys, I’m here to share my recent finding on a website which pulls me to pen down my first post. I can not disclose the name of the…Apr 3, 20203Apr 3, 20203
Bootloader unlocking | Pre-requisites of rooting an Android DeviceWhat is Bootloader Unlock?Oct 30, 2023Oct 30, 2023
Rooting AVD devices.This blog post was in my draft for a very long time and might be helpful for a few of you. I didn’t make any changes. Here it is.Oct 30, 2023Oct 30, 2023
Published inInfoSec Write-upscsictf-2020 OSINT Write-upA month back, in June-2020 we a team(fr3nzyM1n3rs) of 3 members started doing CTFs for the first time. As a beginner we were practicing on…Jul 23, 20201Jul 23, 20201
Published inInfoSec Write-upsRP: Metasploit Walkthrough: TryHackMeAs heading says it all. This is the walkthrough of `RP: Metasploit`. The room link is https://tryhackme.com/room/rpmetasploit.Jul 5, 2020Jul 5, 2020