Hi, My name is Hashar Mujahid. I am a security researcher and a penetration testing student. This is the first blog of the API SECURITY series where we will learn about some com
Read MoreThis blog is useful for everyone ranging from a normal internet user to CISO of an M.N.C. The blog is designed in such a way that there would be no way that you got any false po
Read MoreHallo fellow researchers,Myself, Rafi Ahamed. I am a Cyber Security Researcher from Bangladesh. I love to do things differently. Anyway, without further ado let’s get to today
Read MoreHi Guys, I recently found a .svn/wc.db folder exposed on a resident.uidai.gov.in, and used it to reconstruct the Web app’s source code. I cannot find any article about svn, So
Read MoreSometimes a user with low privileges needs to perform specific tasks with higher privileges and for that Linux has functionality for setting SUID bit on particular binaries. Th
Read MoreBug Bounty Writeup about DOM XSS via JSONP + Parameter pollution Photo by Pepi Stojanovski on Unsplash Hello 👋 This is my first and last Bug Bounty Writeup this ye
Read More