Published inInfoSec Write-upsParam Hunting to InjectionsHey hackers! How’s your week going?Dec 16, 20221902Dec 16, 20221902
Published inInfoSec Write-upsFrida & Objection without Jailbreak! 🔥🔥So are you the one who stops security testing if Jailbreak Detection is not bypassed?? No worries, we have got you covered! A method to…Nov 16, 2022382Nov 16, 2022382
Published inInfoSec Write-upsCool Recon techniques every hacker misses! Episode 3🔥🔥Welcome to the 3rd Episode of Cool Recon Techniques. We are back with some more cool recon techniques which we think hackers out there…Nov 8, 20222733Nov 8, 20222733
Published inInfoSec Write-upsAndroid Pentesting 101 — Part 3Welcome to Part 3 of Android Pentesting. This series is about how you can hack into Android and find vulnerabilities in it using various…Oct 30, 2022891Oct 30, 2022891
Published inInfoSec Write-upsAndroid Pentesting 101 — Part 2Welcome to Part 2 of Android Pentesting. This series is about how you can hack into Android and find vulnerabilities in it using various…Oct 25, 202258Oct 25, 202258
Published inInfoSec Write-upsAndroid Pentesting 101 — Part 1Welcome to this new series of Android Pentesting. This series is about how you can hack into Android and find vulnerabilities in it using…Oct 22, 20222621Oct 22, 20222621
Published inInfoSec Write-upsBugcrowd — Tale of multiple misconfigurations!! ❌Welcome to this new article. This article is a story about misconfigurations found on a domain. Since it is a private program let’s call…Oct 4, 20221642Oct 4, 20221642
Published inInfoSec Write-upsCool Recon techniques every hacker misses! Episode 2🔥🔥Welcome to the 2nd Episode of Cool Recon Techniques. We are back with some more cool recon techniques which we think hackers out there…Sep 18, 20224255Sep 18, 20224255
Published inInfoSec Write-upsMass Hunting CVE’s Part-1👀🔥CVE, short for Common Vulnerabilities and Exposures, is a list of publicly disclosed computer security flaws. A CVE number uniquely…Aug 31, 20223684Aug 31, 20223684
Published inInfoSec Write-upsCool Recon techniques every hacker misses! 🔥🔥Welcome to this article! This article is about some cool recon techniques every hacker misses! Tighten your belts as we walk you through…Aug 23, 20221K10Aug 23, 20221K10
Published inSystem WeaknessVAPT — Common & Uncommon Interview Questions! Episode-2This is a continuation of the amazing Common & Uncommon Interview Questions for VAPT. If you haven’t read the first article you can find…Aug 9, 20223Aug 9, 20223
Published inSystem WeaknessVAPT — Common & Uncommon Interview Questions! Episode-1Here are some of the amazing interview questions that we came across and wanted to share with you.Aug 1, 20221Aug 1, 20221
Published inInfoSec Write-upsHow I found my first RCE!Remote code executions (RCEs) are dreams of all, but only some of them have found it. This story is about how I was able to find my RCE…Jul 13, 20227Jul 13, 20227
Python and Firestore Database: A beautiful storyRead data from Firestore Database in PythonMar 29, 2022Mar 29, 2022