PinnedHow I Found Credentials from an Empty FileUnveiling my journey to hack a well known organisation May 20, 2024A response icon8May 20, 2024A response icon8
Intigriti Hackdonalds CTF WriteupChaining Next.js Auth Bypass and XXE to Read System Files & Capture the FlagApr 13Apr 13
Black Hat tactics and a White Hat MindsetBug bounty: hack like Mr Robot, takeover admin panel with blackhat approch Dec 2, 2024A response icon1Dec 2, 2024A response icon1
Cybercriminals are using "@" Symbol to Mask Phishing LinksMasking Malicious Links Behind Trusted Domain NamesAug 17, 2024Aug 17, 2024