PinnedPublished inInfoSec Write-upsUtilizing AI Model for Hacking: Bypassing CAPTCHAs using AI leads to Account Takeover | Bug BountyLeveraging AI for CAPTCHA bypass opens the door to potential vulnerabilities, revealing critical flaws in web security.Oct 1, 20243Oct 1, 20243
Published inInfoSec Write-upsFacebook Text Injection Vulnerability: A Creative Approach | Bug BountyHi Guys, In this write-up, we’ll walk through the steps we took to identify the vulnerability of a simple text injection and how we…Jan 66Jan 66
Published inInfoSec Write-upsBypassing Account Suspension Using Anonymous Posting | Facebook Bug BountyHi guys,Jul 17, 2024Jul 17, 2024
Enhance Your Terminal Experience with Highlight Tools: A Comprehensive Guidehighlight is a script to detect and highlight patterns such as URLs, domains, IPv4 addresses, IPv6 addresses, subnets, ports, categories…Jun 16, 2024Jun 16, 2024
Published inInfoSec Write-upsHow i Find Database Credentials via Mass Recon & Recon Scoping on GcashHi guys,Apr 22, 20248Apr 22, 20248
How i Hacked Scopely using “Sign in with Google”how i access any account via visiting malicious link and hacked their gmail accounts via abusing “Sign in with Google”.Jan 23, 20231Jan 23, 20231
View Friends List of any users using “View as” | Facebook Bug bountyHello guys,Apr 2, 20222Apr 2, 20222
Staff Information Disclosure on Support Ticketing System (P2 - $x,xxx)Hi Guys, so i want to share how i got $x,xxx in private program..Jan 22, 20211Jan 22, 20211
My First Bug Bounty at Facebook (Broken feature)How i got my bug bounty on f acebook with broken feature…Jan 5, 20211Jan 5, 20211