Hi, My name is Hashar Mujahid. I am a security researcher and a penetration testing student. This is the first blog of the API SECURITY series where we will learn about some com
Read MoreHey guys, it's me Dheeraj Yadav and in today's blog, we will learn about all the techniques used for analyzing email and verifying if it's legit or not.This blog is useful for e
Read MoreHallo fellow researchers,Myself, Rafi Ahamed. I am a Cyber Security Researcher from Bangladesh. I love to do things differently. Anyway, without further ado let’s get to today
Read MoreHi Guys, I recently found a .svn/wc.db folder exposed on a resident.uidai.gov.in, and used it to reconstruct the Web app’s source code. I cannot find any article about svn, So
Read MoreSometimes a user with low privileges needs to perform specific tasks with higher privileges and for that Linux has functionality for setting SUID bit on particular binaries. Th
Read MoreBug Bounty Writeup about DOM XSS via JSONP + Parameter pollution Photo by Pepi Stojanovski on Unsplash Hello 👋 This is my first and last Bug Bounty Writeup this ye
Read More