neelamThe Evolving Landscape of Medical Security ChallengesIn the ever-expanding realm of healthcare technology, the challenges surrounding medical security have become more pronounced than ever…Nov 5, 2023Nov 5, 2023
neelamHow to write a good and acceptable report :)Many people have been asking me this question on twitter about report writing…documentation is very crucial part in any security…Nov 5, 20211Nov 5, 20211
neelamBroken Access Control RightsThis vulnerability is categorized on OWASP top 10 (2021)Oct 23, 2021Oct 23, 2021
neelam(Chain of bugs) From IDOR to Privilege escalationThis bug became one of my special one not only because it gave me handsome bounty but also because it was not easy to identify.Aug 1, 20211Aug 1, 20211
neelamCVE on radio technology :DThis blog is not about any bounty tricks moreover it’s based on the CVE I received this year on a product.Jun 8, 20211Jun 8, 20211
neelamCORS(How to find, identify and exploit)Cross-Origin Resource Sharing has never been easy to find especially when it comes to exploiting the vulnerability.Apr 12, 2021Apr 12, 2021
neelamAttacking on trial expirationThis is something more interesting to me :DSep 16, 20201Sep 16, 20201
neelamHow I earned $1200 on a bounty program :OHey!!! how is your lockdown going on :DAug 31, 2020Aug 31, 2020
neelamA Simple IDOR which should not be missed on dating site ;)Hello Again!!!Jul 26, 20202Jul 26, 20202