PinnedPublished inInfoSec Write-upsSome critical vulnerabilities found with passive analysis on bug bounty programs explainedThis post describes three vulnerabilities found on paid bounty programs along with an overview about how it was found and the performed…Mar 7, 20223Mar 7, 20223
Published inInfoSec Write-upsBusiness logic flaw in invitation system allows to Takeover any account at private companyWeb application Vulnerability WriteupJun 15, 20201Jun 15, 20201
Published inInfoSec Write-upsBanner Grabbing to DoS and Memory CorruptionBanner Grabbing to DoS and Memory Corruption on IIS serverApr 16, 2019Apr 16, 2019
Published inInfoSec Write-upsBypassing rate limit abusing misconfiguration rulesHello Friends,Feb 15, 20197Feb 15, 20197
Published inInfoSec Write-upsWhen Cookie Hijacking + HTML Injection become dangerousHello Friends,Jan 7, 2019Jan 7, 2019
Published inInfoSec Write-upstaking over google calendar of a companyHello Guys!Dec 4, 20181Dec 4, 20181
Published inInfoSec Write-upsFrom Security Misconfiguration to Gaining Access of SMTP serverHello Guys!Nov 18, 2018Nov 18, 2018