PinnedPublished inInfoSec Write-ups🕵️♂️My Journey of Securing WHO 🌏Hello Hackers, Today in this writeup I am going to disclose how I found an HTMLI in email bug in World Health Organization (WHO) which was…Feb 93Feb 93
PinnedPublished inInfoSec Write-ups🕵️♂️My Story of Securing NASA🚀Happy New year to all my readers!🎉Today in this writeup I will share you all the details how I discover bugs in to NASA and how I secured…Jan 35Jan 35
PinnedPublished inInfoSec Write-upsMy First year in Bug Bounty 👨💻Hello all, In this write-up I summarizes my year in bugbounty on all big platform, self hosted and all the numbers, bugs submitted…Dec 28, 202422Dec 28, 202422
PinnedPublished inInfoSec Write-upsMethods to bypass 403 & 401Hello Hackers, today in this write-up I am going to give you all things you need to know to bypass 403 & 401 error page, some automation…Nov 23, 2024Nov 23, 2024
Published inInfoSec Write-upsHTMLI to ATO leads to $$$ bounty 🤑Hello Hackers, In this writeup I am going to discuss my recent finding on Samsung, like how I found the bug and as a award they awarded me…Feb 176Feb 176
Published inInfoSec Write-upsEasy Peasy RXSS 👾Hello Hackers, Today in this quick writeup I am going to share one of my finding of Reflected xss which was actually easy to find. So let’s…Feb 13Feb 13
Published inInfoSec Write-ups🚨 Found HTML Injection in Emails! Earned HOF 🏆Hello Hackers, In the quick writeup I am going to disclose my recent finding of HTMLI in email in Quickreel through comolho bug bounty…Jan 203Jan 203
Published inInfoSec Write-upsWeird JavaScript files 🥴Hello Hacker, In this writeup I am going to explain the importance of looking JS files on the website, some tools that I preferred and also…Jan 8Jan 8
Published inInfoSec Write-upsMy First Encounter with Stored XSS 🕵️♂️💣Hello everyone, I am Dishant. Today in this write-up I am going to discuss how I find my first stored xss and which lead me to get HOF in…Dec 25, 20242Dec 25, 20242
Published inInfoSec Write-upsAdmin Panel Access via Default Credentials 🤩Hello Hackers, In this write-up I am going to tell how quickly and easily I can access to admin panel using default credentials.Dec 18, 20242Dec 18, 20242
Published inInfoSec Write-ups💥 My First Critical Bug: Exposing 350K+ PII! 🛡️Hello Hackers, Today in this write-up I am going to tell you how accidently I discovered my very first critical bug which is disclosing…Dec 14, 20246Dec 14, 20246
Published inOSINT Team🎉 My First Bounty of ₹₹₹ 🎉Hello Hackers! 👋 I’m Dishant, and today I’m thrilled to share the story of how I earned my first bounty with a simple yet impactful…Dec 7, 202411Dec 7, 202411
Published inOSINT Team🚀 ISRO: YouTube Broken Link Hijack 🐞Hello Hackers, Today in this write-up I am going to discuss very quick and easy bug broken link hijacking and how I got acknowledge from…Nov 14, 20242Nov 14, 20242
Published inOSINT TeamAlert: Reflected XSS Detected 👽Hello Hackers, Today in this write-up I am going to tell you how I bypass WAF and found 3 RXSS vulnerability in the same domain with the…Nov 5, 20242Nov 5, 20242
Published inOSINT TeamBypassing File Upload Defenses: My Journey from Simple Bypass to Near RCEHello Hackers, Today in this write-up I am going to tell you how I am able to bypass file upload restrictions to upload php or any files…Oct 27, 20241Oct 27, 20241
Published inInfoSec Write-upsCracking ATO via Email HTML InjectionHello hackers, today in this write-up I am going to share how I find HTML injection in email in one of the self hosted target. And to show…Oct 12, 2024Oct 12, 2024
Published inOSINT TeamChaining Application-Level DoS with CSRF: A Sneaky Exploit to Block User LoginsHello Hackers, In this writeup I am going to discuss how I chained application level dos with csrf to restrict users to login to their…Oct 1, 2024Oct 1, 2024
Published inOSINT TeamPassword Reset Flaws: Key Methods for Finding VulnerabilitiesHello Hackers, In this writeup I am going to discuss some methods to hunt on Password Reset Functionality. When you are testing this…Sep 12, 20243Sep 12, 20243
Advanced Web Cache Poisoning Techniques (Part 2): Tools, Methods, and ExploitsHello hackers, Today in this writeup I am going to tell you some techniques to find web cache poisoning with their resources and all the…Aug 21, 20241Aug 21, 20241