Published inInfoSec Write-upsLogin DoS — That requires simply sending a lot of specially crafted requestsHi there,Jan 202Jan 202
Published inInfoSec Write-upsCTBB Podcast — Attack Vector IdeationIn this article, I share my views mixed with Justin’s ideas in his videoOct 29, 20231Oct 29, 20231
Published inInfoSec Write-upsMy experience with BugBase copilotMy first experience with bugbase pentest copilot (AI)Sep 2, 2023Sep 2, 2023
Published inInfoSec Write-upsAutomated Monitoring + Time = Bug, the bug on HackerOne Target (8x8)How I found a bug with the help of 100% automationMay 31, 20231May 31, 20231
Published inInfoSec Write-upsWardrive without a GPS module and WiFi adapter that supports monitor mode, but a Raspberry PiCollect WiFi data of a location with the help of a mobile and a raspberry pi, and plot it on a mapFeb 1, 2023Feb 1, 2023
Published inInfoSec Write-upsSetting up your bug bounty scripts with Python and BashHow to set up python and bash scripts for bug bounty automation for powerful automation? Thought about this ever? Read this article to…Dec 30, 2022Dec 30, 2022
Published inInfoSec Write-upsMonitoring your targets for bug bountiesAn intro to setting up a monitoring system for your bug bounty targetSep 26, 2022Sep 26, 2022
Published inInfoSec Write-upsLog Poisoning — Inject payloads in logsLogs… These are the files, in which all the activities on a server are stored. These are used for monitoring, troubleshooting, fixing bugs…Apr 4, 20221Apr 4, 20221
VishwaCTF-22 => John the rocker (Cryptography)Detailed writeup for John the Rocker (VishwaCTF-22, Cryptography)Mar 22, 2022Mar 22, 2022
VishwaCTF-22 => Overcook (Reverse Engineering)Detailed writeup for VishwaCTF-Overcook (Reverse Engineering)Mar 22, 2022Mar 22, 2022