PinnedPublished inInfoSec Write-upsThis Is How I Hacked My Neighbors ComputerNot only websites and companies get hacked, A real life storyJun 26, 2021A response icon10Jun 26, 2021A response icon10
PinnedPublished inInfoSec Write-upsAn HTML Injection Worth 600$ DollarsWhen not letting go, and fighting for your rights, payback..Mar 19, 2021A response icon1Mar 19, 2021A response icon1
PinnedPublished inInfoSec Write-upsFinding And Exploiting S3 Amazon Buckets For Bug BountiesMany websites have private S3 buckets holding secrets inside. We want them.Mar 9, 2021A response icon4Mar 9, 2021A response icon4
Published inInfoSec Write-upsStored XSS to Admin in Unauthenticated-WordPressAbusing security features the right wayJan 18Jan 18
Published inInfoSec Write-upsLFI WITH PHPINFO TO RCELFI vulnerabilities when testing PHP applicationsJul 30, 2024A response icon2Jul 30, 2024A response icon2
Published inInfoSec Write-upsMy Hunt: Discovering Microsoft BugsNavigating the Terrain of Microsoft’s Software: Insights from a Bug HunterMay 11, 2024A response icon2May 11, 2024A response icon2
Published inInfoSec Write-upsHack Stories: Hacking Hackers EP:3The Cybersecurity World is Not As Big As You May ThinkApr 24, 2024A response icon4Apr 24, 2024A response icon4
Published inInfoSec Write-upsHack Stories: Hacking Hackers EP:2LockBit, Noname57, CyberDragon… Ah The RussiansFeb 28, 2024Feb 28, 2024
Published inInfoSec Write-upsHack Stories: Hacking Hackers EP:1When cockiness backfires and put your company at risk.Feb 12, 2024A response icon2Feb 12, 2024A response icon2
Published inInfoSec Write-upsWindows Login BypassHow to use a USB to Unlock your BoxNov 29, 2023A response icon1Nov 29, 2023A response icon1