How I Make Two SQL Injections Exploitable under the Magic Restricts in WordPressWordPress Bug Bounty Write-up for Patchstack Competition #3Jul 12, 2024Jul 12, 2024
How I Find Another Arbitrary File Upload Vulnerability and Bypass the Patch TwiceWordPress Bug Bounty Write-up for Patchstack Competition #2May 19, 2024May 19, 2024
Published inInfoSec Write-upsMy LLM Bug Bounty Journey on Hugging Face Hub via Protect AIFrom Informative Rejection to Black Hat BriefingMay 11, 2024May 11, 2024
Published inInfoSec Write-upsTen Tips You Have to Know for WordPress Bug BountyFrom Bounty Platform to Hunting TricksApr 14, 2024Apr 14, 2024
How I Find My First Internet Bug Bounty for Apache AirflowLogic Flaw to Pickle DeserializationApr 12, 2024Apr 12, 2024
How to Fuzz Prototype Pollution by Reusing Public CVEs for Fun and ResearchBug Hunting Write-up for Node.js SecurityApr 11, 2024Apr 11, 2024
How I Find an Arbitrary File Upload Vulnerability with a Unique BypassWordPress Bug Bounty Write-up for Patchstack Competition #1Apr 10, 2024Apr 10, 2024
Published inInfoSec Write-upsMy WordPress Bug Bounty Journey on PatchstackFrom First Rejection to Monthly TopApr 9, 20241Apr 9, 20241