🎰 How I Hacked an Indonesian Online Gambling Website With This Stupid Vulnerability 😎☁️Disclaimer: This blog is for educational purposes only. Don’t be dumb, stay ethical. Some details have been redacted to protect sensitive…3d ago13d ago1
💰 Bug Bounty Tips: Mastering XML-RPC Exploits Like a Pro 🚀Hey, fellow hackers! 🎯 If you’re into WordPress hacking, bug bounty hunting, or penetration testing, you might have overlooked an old butApr 2Apr 2
🔍 Bug Bounty Tips: Exploiting .git File Disclosure for Fun & ProfitWhen performing a penetration test, one of the most overlooked but critical misconfigurations is .git file disclosure.Mar 31Mar 31
Bug Bounty Tips: Subdomain Takeover — Explanation, Steps & MitigationBug bounty hunting is an exciting field that rewards security researchers for identifying vulnerabilities in websites and applications…Mar 29Mar 29
🔥 Bug Bounty Tips: Finding Stored XSS via File Upload (PNG, SVG, etc.)Stored XSS (Cross-Site Scripting) through file uploads is one of the most overlooked yet powerful attack vectors in bug bounty hunting. If…Mar 27Mar 27
Bug Bounty Tips: How to Find Hidden API Keys in JavaScript Files Like a Pro! 🚀Hey, fellow bug hunters! 🕵️♂️ If you’re into bug bounty hunting, you probably know how often developers accidentally expose sensitive…Mar 26Mar 26
Exploiting JavaScript Execution in PDFs & How to Prevent ItExploiting JavaScript Execution in PDFs & How to Prevent ItMar 24Mar 24
Creating the linux ransomware using python first timeHow Attackers Create Linux Ransomware Using Python (And How to Protect Yourself)Mar 23Mar 23
How I Found an SSTI Leading to Stored XSS VulnerabilitySecurity vulnerabilities often chain together in unexpected ways. One of my most interesting findings was when a Server-Side Template…Mar 23Mar 23