apexLearning Basics: Over The Wire (Bandit -> Level 1 → Level 17)I know it’s been way too long, since I wrote an article. I was just too busy with my studies. Anyway, lets jump right in. I started this…Oct 4, 2022Oct 4, 2022
apexBug Bounty — How to approach Vulnerabilities ( PART 1 )Hello people, it’s me again. In most cases, with automated tools, you can possibly find low level security bugs i.e most likely Blind XSS…Mar 2, 2022Mar 2, 2022
apexTop 10 API Bugs — Where To Find ThemLadies and Gentlemen, let’s do some API hacking today. I will discuss some of the top 10 API bugs and where one can find them.Feb 17, 20223Feb 17, 20223
apex2FA Bypass TechniquesHello lads, it’s me again. Let’s discuss different techniques about bypassing 2FA.Feb 8, 20221Feb 8, 20221
apexHow to access Ransomware sites?Hello again, today let’s discuss about accessing ransomware sites using TOR browser.Jan 22, 20221Jan 22, 20221
apexBug Bounty Methodology — Bug Hunting Checklist(PART-2)Hello people, it’s me again. I apologize for being late about the second part. I had some examinations going on and have been busy for the…Jan 20, 20221Jan 20, 20221
apexBug Bounty Methodology — Bug Hunting Checklist (PART-1)Hey, it’s me again back with another checklist. I saw various articles and tools specifically designed to exploit one vulnerability. It…Jan 13, 20223Jan 13, 20223
apexBug Bounty Methodology — Horizontal EnumerationWhile performing a security assessment our main goal is to map out all the domains owned by a single entity. This means knowing all the…Jan 12, 20222Jan 12, 20222
apexSubdomain Enumeration — The Right way (Prerequisites)So, I have seen various articles about subdomain enumeration and decided to make one in detail without confusing everyone with various…Jan 12, 20222Jan 12, 20222
apexBug Bounty Methodology - Web Vulnerabilities ChecklistHello guys, it’s me again. I know malware analysis might be boring because of debugging and code analysis especially for the people who are…Jan 11, 20222Jan 11, 20222