The ART of Chaining VulnerabilitiesDeep Dive into breaking applications and chaining vulnerabilities to hack complete infrastructures.Dec 23, 20233Dec 23, 20233
From Revealing Emails to Taking Over Accounts (Hacking Telecom)Hacking Telecom — Revealing user’s emails then taking over their accounts.Aug 12, 20234Aug 12, 20234
PII Disclosure of Apple Users ($10k)How I hacked Apple and was able to Disclose Apple Users Private Shipping Information and Mobile Numbers.Jul 7, 202213Jul 7, 202213
Ultimate Reconnaissance RoadMap for Bug Bounty Hunters & PentestersAdvanced Reconnaissance and Web Application Discovery RoadMap to Find Massive Vulnerabilities.Dec 22, 202114Dec 22, 202114
Taking Over Employee Accounts by Managers with Zero Employee InteractionHello,Aug 13, 2021Aug 13, 2021
My Experience For 2 Years In Bug Bounty HuntingMy experience and achievements that were gathered during Bug Bounty Hunting that I started 2 years ago.Jun 26, 20217Jun 26, 20217
Published inInfoSec Write-upsRCE via Internal Access to Adminer Database Management (Critical)How I was able to access an internal Database Management leading to Remote Code Execution.Apr 24, 20213Apr 24, 20213
Finding Hidden Login Endpoint Exposing Secret `Client ID`From Low to High Severity Vulnerability. Finding Hidden Login Endpoint Exposing Secret `Client ID`.Mar 7, 20215Mar 7, 20215
Secret Key Exposure in API Config DirectorySecret Key Exposure - High SeverityFeb 28, 20212Feb 28, 20212