The Evolving Landscape of Medical Security ChallengesIn the ever-expanding realm of healthcare technology, the challenges surrounding medical security have become more pronounced than ever…Nov 5, 2023Nov 5, 2023
How to write a good and acceptable report :)Many people have been asking me this question on twitter about report writing…documentation is very crucial part in any security…Nov 5, 2021A response icon1Nov 5, 2021A response icon1
Broken Access Control RightsThis vulnerability is categorized on OWASP top 10 (2021)Oct 23, 2021Oct 23, 2021
(Chain of bugs) From IDOR to Privilege escalationThis bug became one of my special one not only because it gave me handsome bounty but also because it was not easy to identify.Aug 1, 2021A response icon1Aug 1, 2021A response icon1
CVE on radio technology :DThis blog is not about any bounty tricks moreover it’s based on the CVE I received this year on a product.Jun 8, 2021A response icon1Jun 8, 2021A response icon1
CORS(How to find, identify and exploit)Cross-Origin Resource Sharing has never been easy to find especially when it comes to exploiting the vulnerability.Apr 12, 2021Apr 12, 2021
Attacking on trial expirationThis is something more interesting to me :DSep 16, 2020A response icon1Sep 16, 2020A response icon1
How I earned $1200 on a bounty program :OHey!!! how is your lockdown going on :DAug 31, 2020Aug 31, 2020
A Simple IDOR which should not be missed on dating site ;)Hello Again!!!Jul 26, 2020A response icon2Jul 26, 2020A response icon2