Learning Basics: Over The Wire (Bandit -> Level 1 → Level 17)I know it’s been way too long, since I wrote an article. I was just too busy with my studies. Anyway, lets jump right in. I started this…Oct 4, 2022Oct 4, 2022
Bug Bounty — How to approach Vulnerabilities ( PART 1 )Hello people, it’s me again. In most cases, with automated tools, you can possibly find low level security bugs i.e most likely Blind XSS…Mar 2, 2022Mar 2, 2022
Top 10 API Bugs — Where To Find ThemLadies and Gentlemen, let’s do some API hacking today. I will discuss some of the top 10 API bugs and where one can find them.Feb 17, 20223Feb 17, 20223
2FA Bypass TechniquesHello lads, it’s me again. Let’s discuss different techniques about bypassing 2FA.Feb 8, 20221Feb 8, 20221
How to access Ransomware sites?Hello again, today let’s discuss about accessing ransomware sites using TOR browser.Jan 22, 20221Jan 22, 20221
Bug Bounty Methodology — Bug Hunting Checklist(PART-2)Hello people, it’s me again. I apologize for being late about the second part. I had some examinations going on and have been busy for the…Jan 20, 20221Jan 20, 20221
Bug Bounty Methodology — Bug Hunting Checklist (PART-1)Hey, it’s me again back with another checklist. I saw various articles and tools specifically designed to exploit one vulnerability. It…Jan 13, 20223Jan 13, 20223
Bug Bounty Methodology — Horizontal EnumerationWhile performing a security assessment our main goal is to map out all the domains owned by a single entity. This means knowing all the…Jan 12, 20223Jan 12, 20223
Subdomain Enumeration — The Right way (Prerequisites)So, I have seen various articles about subdomain enumeration and decided to make one in detail without confusing everyone with various…Jan 12, 20222Jan 12, 20222
Bug Bounty Methodology - Web Vulnerabilities ChecklistHello guys, it’s me again. I know malware analysis might be boring because of debugging and code analysis especially for the people who are…Jan 11, 20222Jan 11, 20222