PinnedHow I Found My First RCE !Unveiling My First RCE JourneyMay 13, 2024A response icon10May 13, 2024A response icon10
PinnedRCE via Dependency Confusion: A Real-World Attack on Unclaimed npm PackagesHacking Servers Through Misconfigured Node.js PackagesNov 5, 2024A response icon3Nov 5, 2024A response icon3
PinnedMisconfiguration Leads to P1 XSSReflected XSS via Misconfiguration in Get ParameterOct 31, 2023A response icon3Oct 31, 2023A response icon3
port-scanning for large scopes can lead to $$$$Hacking Mosquitto: How a Port 1883 Service Led to $$$May 15A response icon2May 15A response icon2
HTB UNIV ctf 24 (Armaxix - WEB)In this writeup, we’ll explore a lab instead of focusing on a new bug in bug bounty. While CTF challenges teach us a lot, they often differ…Dec 17, 2024Dec 17, 2024
Uncovering Path Traversal Through Host MonitoringAutomating Host Monitoring for More TargetsOct 12, 2024Oct 12, 2024
Self-XSS via filename + CSRF on contact us ‘multipart/data’ formExploiting Filename Reflection and CSRF in Contact Forms: A Detailed RXSS WalkthroughMay 28, 2024A response icon4May 28, 2024A response icon4
Unlocking XSS Vulnerabilities: A Simple Technique for Bug HuntersSimple Trick To Get XSSSep 13, 2023Sep 13, 2023