PinnedPublished inInfoSec Write-upsBreaking Down SSRF on PDF Generation: A Pentesting GuideHello Hackers, I Hope you guys are doing well and hunting lots of bugs and dollars !Jul 21, 2023Jul 21, 2023
Published inInfoSec Write-upsAll About API Security PentestingAPI Security Pentesting MethodologiesMay 261May 261
Published inInfoSec Write-upsAll About Attacking JWTJWT: The Weak Link in Your Security Chain? Understanding and Addressing JWT-related ThreatsJan 29, 2023Jan 29, 2023
Published inInfoSec Write-upsAll about Account TakeoverAccount Takeover MethodsFeb 27, 20221Feb 27, 20221
Published inInfoSec Write-upsOTP Bypass via Response ManipulationBypassing OTPJul 18, 20213Jul 18, 20213
Published inInfoSec Write-upsAll about unrestricted file uploadFile upload attacksJun 7, 2021Jun 7, 2021
Published inInfoSec Write-upsAll about Multi-factor Authentication security BypassBypassing 2FA securityMay 24, 20214May 24, 20214
Published inInfoSec Write-upsAll about Password Reset vulnerabilitiesBug bounty approach for finding bugs in password reset functionMay 17, 20216May 17, 20216
Published inInfoSec Write-upsAll about File upload XSSDifferent ways to triggered XSS though file uploadMay 10, 20212May 10, 20212