How I approached Dependency Confusion!Hi People, In this blog, I will be sharing my approach for finding Dependency Confusion bugs.Jan 31, 20225Jan 31, 20225
Assigned my First CVE-2020–28726!!In this blog post, I’ll be sharing about how I was assigned my CVE :)Dec 9, 2020Dec 9, 2020
Published inInfoSec Write-upsThe First Bounty Target (Disclosing Multiple Reports)Hello,Nov 21, 2020Nov 21, 2020
Published inInfoSec Write-upsTale of my First XSSHi guys, So I would like to start this blog with a question, What was the first vulnerability you learnt when you began into Cyber…May 26, 20201May 26, 20201
Published inCyber VerseHTTP Request Smuggling in Plain English.Hello everyone, this is the topic in which I’ve really struggled learning it. So I decided to understand it from the various blog post…Apr 13, 20204Apr 13, 20204
Published inInfoSec Write-upsHow Inspect Element Got me a BountyHello Guy, I recently encountered an amazing bypass to change my Phone Number in an application that doesn’t allow anyone to change its…Feb 6, 20201Feb 6, 20201
Published inCyber VerseCRLF Injection PlaybookHello Guys, Just a Rough analysis of bugs Disclosed Publicly about CRLF injectionJan 12, 20201Jan 12, 20201
Published inCyber VerseFind Secret API-KeysHello everyone, it may be just another blog on how to find API keys, but here I’ll try to give every Information about finding the secret…Dec 22, 20194Dec 22, 20194
Published inCyber VerseAutomating BURP to find IDORsHello hunters, In this blog, I will help you setup-up Autozie and Autorepeater to find IDORs with the help of Burp Suite.Dec 12, 2019Dec 12, 2019