Microsoft Forms Vulnerability: Reflected Cross-site Scripting (XSS) In this blog post, I will discuss the details of a reflected cross-site scripting (XSS) vulnerability in Mic
Read MoreDomain Admin Compromise Hi everyone; I hope you enjoyed my previous blog post on “How I obtained Admin access in 30 seconds” — so today I am bringing you another CRITICAL
Read MoreHi there, Automation is very interesting things, and if done in a right manner, it is more interesting. But writing automation scripts is the most important thing for that. So,
Read MoreBug Bounty Writeup about DOM XSS via JSONP + Parameter pollution Photo by Pepi Stojanovski on Unsplash Hello 👋 This is my first and last Bug Bounty Writeup this ye
Read MoreIn this article, I want to discuss about my journey of making $1000 dollars from Bug Bounty program and the lessons I learned through this journey that can help others who are s
Read MoreI recently discovered a CRLF injection vulnerability on a popular website. In this blog post, I will describe the vulnerability and the attack scenarios that I was able to demon
Read More