Exploiting Promo Code Flaw: Abusing Codes to Buy Items for FreeIn the world of online shopping, promo codes are a popular method for consumers to access discounts, special offers, and free products…Jan 19Jan 19
How to Stand Out as a Microsoft Student Ambassador: Perks, Process, and MoreAre you passionate about technology, eager to share your knowledge with others, and looking to make a significant impact on your academic…Aug 26, 2024Aug 26, 2024
Published inInfoSec Write-upsFrom Uncovering to Securing: Tackling Three Vulnerabilities in Educational DomainIn the ever-evolving landscape of digital education, ensuring the security of online platforms is paramount. As a security researcher, I…Jul 10, 2024Jul 10, 2024
Published inInfoSec Write-upsRace Condition and Broken Access Control on Developer DashboardIn the vast landscape of the digital world, security is the cornerstone of trust. Just as a sturdy lock secures our physical belongings…Apr 19, 2024Apr 19, 2024
Published inInfoSec Write-upsExploiting an IDOR that deletes Victim’s job alertIn the ever-evolving landscape of cybersecurity, hidden vulnerabilities lie beneath the surface, waiting to be discovered. Recently, I…Feb 17, 20242Feb 17, 20242
Published inInfoSec Write-upsHow I Stumbled Upon an XSS in Dutch Tax Administration SystemGreetings Everyone. Hope you’re all doing well. In this new article, I will be explaining how I stumbled upon an XSS vulnerability on Dutch…Feb 5, 2024Feb 5, 2024
Published inInfoSec Write-upsBreaking into Cybersecurity: A Beginner’s Guide to Reconnaissance.Knowing the art of reconnaissance is the first step in becoming a master in the always changing field of cybersecurity. The voyage into…Jan 6, 20241Jan 6, 20241
Published inInfoSec Write-upsUnveiling Vulnerabilities: Analyzing Stored XSS and IDOR at Drexel University System.Greetings Everyone. Hope you’re all doing well. In this new write up, I will be narrating two different vulnerabilities i.e Stored XSS and…Dec 10, 2023Dec 10, 2023
Published inInfoSec Write-upsDutch T-Shirts for Dutch Hacks: A Tale of Four Vulnerabilities!!In an increasingly interconnected world, cybersecurity remains a paramount concern for governments, organizations, and individuals. This…Oct 14, 20231Oct 14, 20231
Published inInfoSec Write-upsAn Overview of the Vulnerabilities found in Cambridge University System.Hello everyone! Hope you’ll doing well. I am here with this new writeup explaining four different vulnerabilities which I discovered in…May 14, 2023May 14, 2023