Published inInfoSec Write-upsMacBook Arm Architecture — Installing Windows7 x86_64If you are using Macbook arm and you need some apps or virtual operation systems, you may emulate them via UTM. I will talk about the…Feb 15, 2024Feb 15, 2024
Published inInfoSec Write-upsHTB Machines: Difficulty MattersHi folks, if you are in cyber security on the red side, you probably hear what Hackthebox is. In basic words, it is a platform that…Jan 9, 2024Jan 9, 2024
Published inSystem WeaknessI have found a Bug on HackTheBox AcademyHi Everyone,Jul 25, 20232Jul 25, 20232
Published inInfoSec Write-upsCyber Apocalypse 2023 — The Cursed MissionHello Guys,Mar 25, 2023Mar 25, 2023
Published inInfoSec Write-upsHow to Hack Applications’ LogicHi everyone, I decided to write a guide about finding logical bugs on applications like the web, mobile, and desktop. Actually, this…Dec 5, 20221Dec 5, 20221
Published inInfoSec Write-upsCritical IDOR Vulnerability on Medium?Hello Guys,Oct 12, 2022Oct 12, 2022
Published inInfoSec Write-upsHow I found 3 rare security bugs in a dayHello everyone,Sep 10, 20223Sep 10, 20223
Published inInfoSec Write-upsCyber Apocalypse CTF 2022 — Web — Intergalactic Post Write-upPrompt:May 19, 2022May 19, 2022
Published inInfoSec Write-upsCyber Apocalypse CTF 2022 — Web — Amidst Us Write-upPrompt:May 19, 2022May 19, 2022
Published inInfoSec Write-upsCyber Apocalypse CTF 2022 — Misc — Compressor Write-up (easy way)Prompt:May 19, 2022May 19, 2022