Uncovering a critical bug : Zero-click ATOHello everyone! Today, I’ll walk you through how I discovered a Zero-Click Account Takeover (ATO) vulnerability on a program. Let’s dive…Mar 8Mar 8
Published inInfoSec Write-upsUnverified Email Change Flaw on Apps.Target.com: A Sneaky Account Takeover TrickREAD IT FOR FREEFeb 18Feb 18
Published inInfoSec Write-upsCache Control: An Easy P4 VulnerabilityClick here to Read FreeFeb 152Feb 152
Published inInfoSec Write-upsUnlock the Ultimate Resource Hub for Security ResearchersJoin Our Exclusive Security Research Community on Discord!Jan 91Jan 91
Published inInfoSec Write-upsFrontrunning Vulnerability: What It Is, How to Exploit, Prevent, and Mitigate ItFREE ARTICLEJan 54Jan 54
Published inInfoSec Write-upsHow I Discovered an Email Disclosure VulnerabilityFREE ARTICLEJan 48Jan 48
Published inInfoSec Write-ups🌟 “The Hidden GPS Threat: Unstripped Metadata on Redacted.com led 5K Rubel in bounties” 🕵️♂️📍Free ReadDec 6, 20241Dec 6, 20241
Published inInfoSec Write-ups🚀 Firebase URL Exploitation: Taking Over Android Databases Like a Pro! 😎Free ReadDec 4, 2024Dec 4, 2024
Published inInfoSec Write-ups🚨 Critical Bug: Deny Sign-In & Steal Sensitive Info on Behalf of Victims 🚨Read FreeDec 3, 20241Dec 3, 20241
Published inInfoSec Write-upsAll UPI IDs in India have Predictable Patterns that allow the disclosure of mail IDsRead free …Dec 2, 20243Dec 2, 20243
Published inOSINT Team💥 Smart Contract Funds Lost Due to Missing Address Validation: $80M in Danger! 💥Read FreeDec 1, 20242Dec 1, 20242
Published inInfoSec Write-upsUncovering an IDOR on Reacted.com — A Curious Bug Hunter’s Tale 🕵️♂️✨Sometimes, bug hunting feels like treasure hunting — you never know what you might find hidden just beneath the surface. And this time, it…Nov 15, 20242Nov 15, 20242
Published inInfoSec Write-upsSSRF to Internal Port Scanning on Self-Hosted Platform 🚀Free ArticesOct 31, 20241Oct 31, 20241
Published inOSINT TeamToken leakage through untrusted 3rd partyFree articlesOct 20, 20241Oct 20, 20241
Published inOSINT TeamAuthentication with tx.origin: Why You Should Never Use It for AuthorizationFree articleOct 15, 2024Oct 15, 2024