The ART of Chaining VulnerabilitiesDeep Dive into breaking applications and chaining vulnerabilities to hack complete infrastructures.Dec 23, 2023A response icon4Dec 23, 2023A response icon4
From Revealing Emails to Taking Over Accounts (Hacking Telecom)Hacking Telecom — Revealing user’s emails then taking over their accounts.Aug 12, 2023A response icon4Aug 12, 2023A response icon4
PII Disclosure of Apple Users ($10k)How I hacked Apple and was able to Disclose Apple Users Private Shipping Information and Mobile Numbers.Jul 7, 2022A response icon15Jul 7, 2022A response icon15
Ultimate Reconnaissance RoadMap for Bug Bounty Hunters & PentestersAdvanced Reconnaissance and Web Application Discovery RoadMap to Find Massive Vulnerabilities.Dec 22, 2021A response icon14Dec 22, 2021A response icon14
Taking Over Employee Accounts by Managers with Zero Employee InteractionHello,Aug 13, 2021Aug 13, 2021
My Experience For 2 Years In Bug Bounty HuntingMy experience and achievements that were gathered during Bug Bounty Hunting that I started 2 years ago.Jun 26, 2021A response icon7Jun 26, 2021A response icon7
Published inInfoSec Write-upsRCE via Internal Access to Adminer Database Management (Critical)How I was able to access an internal Database Management leading to Remote Code Execution.Apr 24, 2021A response icon3Apr 24, 2021A response icon3
Finding Hidden Login Endpoint Exposing Secret `Client ID`From Low to High Severity Vulnerability. Finding Hidden Login Endpoint Exposing Secret `Client ID`.Mar 7, 2021A response icon5Mar 7, 2021A response icon5
Secret Key Exposure in API Config DirectorySecret Key Exposure - High SeverityFeb 28, 2021A response icon2Feb 28, 2021A response icon2
Chaining Multiple Requests to Achieve Rate Limiting VulnerabilitiesHello,Nov 29, 2020A response icon3Nov 29, 2020A response icon3