PinnedPublished inInfoSec Write-upsThis Is How I Hacked My Neighbors ComputerNot only websites and companies get hacked, A real life storyJun 26, 202110Jun 26, 202110
PinnedPublished inInfoSec Write-upsAn HTML Injection Worth 600$ DollarsWhen not letting go, and fighting for your rights, payback..Mar 19, 20211Mar 19, 20211
PinnedPublished inInfoSec Write-upsFinding And Exploiting S3 Amazon Buckets For Bug BountiesMany websites have private S3 buckets holding secrets inside. We want them.Mar 9, 20214Mar 9, 20214
Published inInfoSec Write-upsStored XSS to Admin in Unauthenticated-WordPressAbusing security features the right wayJan 18Jan 18
Published inInfoSec Write-upsLFI WITH PHPINFO TO RCELFI vulnerabilities when testing PHP applicationsJul 30, 20242Jul 30, 20242
Published inInfoSec Write-upsMy Hunt: Discovering Microsoft BugsNavigating the Terrain of Microsoft’s Software: Insights from a Bug HunterMay 11, 20242May 11, 20242
Published inInfoSec Write-upsHack Stories: Hacking Hackers EP:3The Cybersecurity World is Not As Big As You May ThinkApr 24, 20244Apr 24, 20244
Published inInfoSec Write-upsHack Stories: Hacking Hackers EP:2LockBit, Noname57, CyberDragon… Ah The RussiansFeb 28, 2024Feb 28, 2024
Published inInfoSec Write-upsHack Stories: Hacking Hackers EP:1When cockiness backfires and put your company at risk.Feb 12, 20242Feb 12, 20242
Published inInfoSec Write-upsWindows Login BypassHow to use a USB to Unlock your BoxNov 29, 20231Nov 29, 20231
Published inInfoSec Write-upsWindows RDP Session HijackingHow Red Team members take control over User’s RDP sessionsJul 31, 20231Jul 31, 20231
Published inDev GeniusHow To Abuse A Password ManagerGetting The Master Key to HeavenJun 24, 2023Jun 24, 2023
Published inDev GeniusHow To Windows Privilege EscalationUnderstanding the “Potato” AttackJun 14, 20231Jun 14, 20231
Published inInfoSec Write-upsHow To Attack Admin Panels Successfully Part 3Are you Attacking Web Apps Admin Panels The Right Way?Feb 26, 2023Feb 26, 2023
Published inGeek CultureHow To Attack Admin Panels Successfully Part 2Not Attacking Web Apps Admin Panels The Right Way?Jan 8, 2023Jan 8, 2023
Published inInfoSec Write-upsHow To Attack Admin Panels SuccessfullyAttacking Web Apps Admin Panels The Right WaySep 28, 20224Sep 28, 20224
Published inDev GeniusUBER: The Personal VendettaNever underestimate someone’s abilitySep 25, 2022Sep 25, 2022
Published inGeek CultureRecognize Speech & Convert It To TextMake an application to recognize and transcribe human speech (often called speech-to-text).Jun 17, 2022Jun 17, 2022
Published inGeek CultureHow I Accidentally Prevented A Mass HackingNot all heroes wear a cape or get pay for their workMar 29, 20221Mar 29, 20221
Published inInfoSec Write-upsWhat is IDOR Vulnerability, and how does it affect you?IDOR stands for insecure direct object referenceMar 7, 2022Mar 7, 2022