The Evolving Landscape of Medical Security ChallengesIn the ever-expanding realm of healthcare technology, the challenges surrounding medical security have become more pronounced than ever…Nov 5, 2023Nov 5, 2023
How to write a good and acceptable report :)Many people have been asking me this question on twitter about report writing…documentation is very crucial part in any security…Nov 5, 20211Nov 5, 20211
Broken Access Control RightsThis vulnerability is categorized on OWASP top 10 (2021)Oct 23, 2021Oct 23, 2021
(Chain of bugs) From IDOR to Privilege escalationThis bug became one of my special one not only because it gave me handsome bounty but also because it was not easy to identify.Aug 1, 20211Aug 1, 20211
CVE on radio technology :DThis blog is not about any bounty tricks moreover it’s based on the CVE I received this year on a product.Jun 8, 20211Jun 8, 20211
CORS(How to find, identify and exploit)Cross-Origin Resource Sharing has never been easy to find especially when it comes to exploiting the vulnerability.Apr 12, 2021Apr 12, 2021
How I earned $1200 on a bounty program :OHey!!! how is your lockdown going on :DAug 31, 2020Aug 31, 2020