PinnedPublished inInfoSec Write-upsThis Is How I Hacked My Neighbors ComputerNot only websites and companies get hacked, A real life storyJun 26, 202110Jun 26, 202110
PinnedPublished inInfoSec Write-upsAn HTML Injection Worth 600$ DollarsWhen not letting go, and fighting for your rights, payback..Mar 19, 20211Mar 19, 20211
PinnedPublished inInfoSec Write-upsFinding And Exploiting S3 Amazon Buckets For Bug BountiesMany websites have private S3 buckets holding secrets inside. We want them.Mar 9, 20214Mar 9, 20214
Published inInfoSec Write-upsLFI WITH PHPINFO TO RCELFI vulnerabilities when testing PHP applicationsJul 30, 20242Jul 30, 20242
Published inInfoSec Write-upsMy Hunt: Discovering Microsoft BugsNavigating the Terrain of Microsoft’s Software: Insights from a Bug HunterMay 11, 20242May 11, 20242
Published inInfoSec Write-upsHack Stories: Hacking Hackers EP:3The Cybersecurity World is Not As Big As You May ThinkApr 24, 20244Apr 24, 20244
Published inInfoSec Write-upsHack Stories: Hacking Hackers EP:2LockBit, Noname57, CyberDragon… Ah The RussiansFeb 28, 2024Feb 28, 2024
Published inInfoSec Write-upsHack Stories: Hacking Hackers EP:1When cockiness backfires and put your company at risk.Feb 12, 20242Feb 12, 20242
Published inInfoSec Write-upsWindows Login BypassHow to use a USB to Unlock your BoxNov 29, 20231Nov 29, 20231
Published inInfoSec Write-upsWindows RDP Session HijackingHow Red Team members take control over User’s RDP sessionsJul 31, 20231Jul 31, 20231