InintigritibyInti De CeukelaireHow I hacked hundreds of companies through their helpdeskUPDATE: The Next Web wrote a story about my findings…Sep 10, 201742Sep 10, 201742
Garvit KohliHow to Disappear from the Internet!Do you know how hackers manage to upload unlawful stuff online while remaining anonymous?Dec 29, 202222Dec 29, 202222
InSystem WeaknessbyVirusZzWarningI Created a Ransomware!!!Hey hi all, so today I have come up with another interesting blog on topic ‘How I created a Ransomware and how I stopped my target from…Jul 18, 20222Jul 18, 20222
InInfoSec Write-upsbyKrishna AgarwalHacking the WordPress sites for fun and profit | Part-1 [ Water ]Hello folks, I am Krishna Agarwal (Kr1shna 4garwal) from India 🇮🇳. An ordinary bug hunter and So called security researcher :)Oct 5, 202216Oct 5, 202216
InInfoSec Write-upsbyOmar HashemHow I Found Multiple SQL Injections in 5 Minutes in Bug BountyHi everybody, SQL Injection is one of the most critical vulnerabilities that can be found in web applications I will show you today how I…Sep 22, 202211Sep 22, 202211
InSystem WeaknessbyS RahulBug Bounty { How I found an Sensitive Information Disclosure( Reconnaissance ) }Hello everyone, Welcome Back!Sep 18, 202210Sep 18, 202210
Clement 'TinoBreaching Active DirectoryIn this article, I went over about 3 methods a threat actor can employ to gain foothold in an Active Directory (AD) doamain. While…Jul 7, 20221Jul 7, 20221
MilanjainA story of Host Header injectionHii all, I am back with a new hacking story . A few days ago, I was hunting on one of the VPD program Where i find a host-head injection…Sep 14, 20222Sep 14, 20222
wh00hwHow To Hack a RestaurantWell, it’s actually a DOS attack but that was a journey into some nerds stuff that bring me to discover how easily you can create problems…Aug 28, 20226Aug 28, 20226
InSystem WeaknessbyS RahulBug Bounty { How I found an SSRF ( Reconnaissance ) }Hello everyone, I am S Rahul, working as a Information Security Analyst at NUK 9 Auditors and A Bug bounty hunter at Hackerone, Bugcrowd…Sep 6, 20229Sep 6, 20229
InInfoSec Write-upsbyTheBountyBoxCool Recon techniques every hacker misses! 🔥🔥Welcome to this article! This article is about some cool recon techniques every hacker misses! Tighten your belts as we walk you through…Aug 23, 202210Aug 23, 202210
InInfoSec Write-upsbycan1337Break the Logic: Insecure Parameters (€300)Hello everyone. Today, I’m going to talk about two minor vulnerabilities based on insecure parameters that I discovered in the same…Aug 24, 20223Aug 24, 20223
InInfoSec Write-upsbySriram KesavanOTP Bypass on India’s Biggest Video Sharing Site.It’s been so long since I posted any article, will continue posting some regarding my recent best findings.Apr 10, 20207Apr 10, 20207
InSystem Weaknessbyvimanari_From Shodan to RCE: That one time I hacked a Fortune 500 company.tl;dr:Aug 8, 20225Aug 8, 20225
0xKch1goDomain Admin’e Giden Yol: Sertifika Servisleri Part 1Yakın zamanda ekip arkadaşım gork ile gerçekleştirmiş olduğumuz yerel ağ testinde karşılaştığımız DFSCoerce ile Sertifika Servisleri…Aug 7, 2022Aug 7, 2022
InThe Gray AreabyAbhinav PathakExtensions used by HackersAs we all know there are so many Extensions present in Browsers nowadays which can easily be installed in browsers and make our work better…Jul 29, 20224Jul 29, 20224