IncsictfbyRishit BansalSelf-hosting a CTF Platform (CTFd)Tips to setup stable and secure infra for showing the scoreboard/challenges during a CTF.Jul 28, 20202Jul 28, 20202
InInfoSec Write-upsbyArvindWhatsApp Bug Bounty: Bypassing biometric authentication using voipBypassing biometric authentication just by making a call and access the app completelyMar 6, 20225Mar 6, 20225
Sam LernerCar (Key) Hacking (Not Really)Here is the key fob for my 2000 Toyota Camry (possibly the best car ever made):Feb 28, 20201Feb 28, 20201
InPC MagazinebyPCMagFTC to US Companies: Patch Log4J Flaw or Face Legal ActionIn issuing the warning, the FTC cites the huge settlement Equifax paid for a 2017 data breach involving a known vulnerability it failed to…Jan 6, 2022Jan 6, 2022
InInfoSec Write-upsbyAseem Shrey (@aseemshrey)One Token to leak them all : The story of a $8000 NPM_TOKENNot long ago, I started a youtube channel, HackingSimplified.Jun 19, 20202Jun 19, 20202
InShiftLeft BlogbyVickie LiAPI Security 101: Improper Assets ManagementAnd why missing documentation is a vulnerability.Sep 14, 2021Sep 14, 2021
Ozgur AlpUnauthorized Google Maps API Key Usage Cases, and Why You Need to CareFor the ones who do not have any information about this service and its API Key’s, Google Maps API is a paid service which allows…Jan 20, 20204Jan 20, 20204
InInfoSec Write-upsbyPratik DabhiHow to get started in CTF | Complete Begineer GuideHey folks, in this blog I’m going to share how do you guys get started in CTF: Capture The Flag (“Jhande Ukhaadne Hai”). So let’s jump…May 19, 2020May 19, 2020
Lokesh KumarHow to Rotate IP ADDRESS For Each Request in Burp SuiteThis post is about to explain how to rotate IP address for each request using Burp Suite.Aug 17, 20212Aug 17, 20212
Orwa AtyatMy Methodology In Recon And Find Bugs & My Methodology In Hunting Using Phone#Dears HuntersAug 19, 202113Aug 19, 202113
Gonzalo CarrascoFuzzing + IDOR = Admin TakeOverHello everyone, this is my first post. I’ve been thinking about writing about my findings for a while, so here we go.Aug 9, 20217Aug 9, 20217
InInfoSec Write-upsbyXcheaterAll about Password Reset vulnerabilitiesBug bounty approach for finding bugs in password reset functionMay 17, 20216May 17, 20216
Kamal SharmaRESEARCH METHODOLOGIES FOR BUG BOUNTY HUNTERSGood morning everyone , its me Kamal Sharma from Nepal. Cyber security has been so important in today’s world. Social media has…Jul 28, 20211Jul 28, 20211
InInfoSec Write-upsbyDhanushLeveraging Burp Suite extension for finding HTTP Request Smuggling.HTTP Request Smuggling is often left behind in bug bounty findings. But with the right extension, you can automate the task of finding HTTP…Jul 7, 2021Jul 7, 2021
InInfoSec Write-upsbysecureITmaniaGenymotion+Xposed+InspeckageAndroid application dynamic analysis lab setup on windowsJul 3, 2021Jul 3, 2021
InInfoSec Write-upsbyNikhil (niks)XXE in Public Transport Ticketing Mobile APPThis finding was an another private bug bounty program. The scope of the target was a ticketing android app (Prod). This app was a major…Jul 29, 2021Jul 29, 2021
Sumit GuptaAdd all subdomains to scope | Burp SuiteFor example, if your target is only www.google.com then the below setting will be fineJan 8, 2021Jan 8, 2021
Jerry Shah (Jerry)GitHub Recon - It’s Really DeepHello everyone, I know that my speed of writing blogs has been decreased it’s because I’m busy with some other stuff. Doesn’t matter I…Jul 9, 20202Jul 9, 20202
+Bilal RizwanWordpress xmlrpc.php -common vulnerabilites & how to exploit themHello there! , whats up ? ,Bilal Rizwan here hope your doing great & having fun learning from the community like I am.Apr 26, 201822Apr 26, 201822