Home
Writeups
About
Unveiling the Hotel Booking Hack: Leveraging Business Logic Flaws for Free Subscriptions and 12% Discounts
Unveiling the Consequences: Database Dump Exploitation through Mass Assignment Vulnerability
Bypassing Web Application Firewall (WAF) to Exploit SQL Injection Vulnerabilities
Exploiting Business Logic Error: Price Manipulation
Account Takeover Through Manipulation of Session Storage
Exploiting Misconfigurations and Authorization Vulnerabilities in a Multinational Company's Content Management System
Analysis of Client-Side Encryption Reverse Engineering
Remote Code Execution via DLL Hijacking on a Prominent Business Automation Application
Insecure Deserialization
Insecure Direct Object References (IDOR) Exploit Enables Unauthorized Access to Linked Bank Accounts
API Security Misconfiguration Leads to tons of PII data Leakage
Time-Based SQL Injection to Dumping the Database
Uncovering the Extensive Subdomain Takeover Vulnerability
Remote Code Execution via File Upload
Jailbreaking iPhone and Setting Up Dynamic Analysis Lab
Remote Code Execution through Unrestricted File Upload
Account Takeover through Response Manipulation
Remote Code Execution through Unrestricted File Upload
Account Takeover Due to Lack of Rate Limiting Protection
Discovery of Reflected Cross-Site Scripting (XSS) Vulnerability in a Public Program