Published inInfoSec Write-upsRevisiting the Past, Hacking the FutureFrom Invalid Reports to Real Vulnerabilities: The Path to Growth in HackingMay 6A response icon3May 6A response icon3
Published inInfoSec Write-upsAPI Hacking on Mercedes-BenzHow Recon and Persistence Led to a Valid XSS on Mercedes-BenzMay 1A response icon4May 1A response icon4
Published inInfoSec Write-upsThe Blank Page That Hid a BugWhat looked like a dead-end static site turned into a bug bounty success.Apr 21A response icon2Apr 21A response icon2
Published inInfoSec Write-upsOne Random Recon, One Real BountyFrom countless dead ends to a single Swagger UI payload — the unexpected breakthrough that changed my bug hunting journey forever.Apr 13A response icon5Apr 13A response icon5
Published inInfoSec Write-upsThe Hidden XSS: A Bug Hidden in the MistFrom Subdomain Chaos to an Unexpected XSS A beginner’s bug bounty journey that led to a hidden Self-XSS on Paytm, with the help of some…Apr 4Apr 4
Published inOSINT TeamGhostFilter: Automating URL Filtering for Smarter Bug HuntingFree Article Link👈Nov 20, 2024Nov 20, 2024
Published inOSINT TeamAutomating XXE Exploitation: A Write-Up on Intigriti CTF 2024 BioCorp ChallengeFree Article Link👈Nov 18, 2024A response icon1Nov 18, 2024A response icon1
Published inOSINT TeamHacking Into Pizza Paradise: A CTF Journey to the FlagFree Article Link👈Nov 17, 2024A response icon2Nov 17, 2024A response icon2
Published inOSINT TeamBreaking In with Guest: My First Bug BountyFree Article LinkNov 13, 2024A response icon2Nov 13, 2024A response icon2