PinnedPublished inInfoSec Write-upsUtilizing AI Model for Hacking: Bypassing CAPTCHAs using AI leads to Account Takeover | Bug BountyLeveraging AI for CAPTCHA bypass opens the door to potential vulnerabilities, revealing critical flaws in web security.Oct 1, 20244Oct 1, 20244
Published inInfoSec Write-upsHow i Access The Deleted Files of Someone in Google Drive | Bug BountyThe Illusion of Deletion: How Trashed Files in Google Drive Can Still Be Accessed — Understanding Google Drive’s Trashed File Accessibility1d ago31d ago3
Published inInfoSec Write-upsBypass File Attachment Restrictions in Google Groups via Email Posting | Bug BountyIntroductionApr 131Apr 131
Published inInfoSec Write-ups1-CLick OAuth Token Hijacking via Google Apps Script – A Design Flaw Ignored? | Bug BountyIntroductionApr 13Apr 13
Practical Web Pentest Professional (PWPP) | TCM Security Certification ReviewPractical Web Pentest Tester (PWPP)/Practical Web Pentest Professional (PWPT) — TCM Security Certification ReviewMar 25Mar 25
Published inInfoSec Write-upsFacebook Text Injection Vulnerability: A Creative Approach | Bug BountyHi Guys, In this write-up, we’ll walk through the steps we took to identify the vulnerability of a simple text injection and how we…Jan 68Jan 68
Published inInfoSec Write-upsBypassing Account Suspension Using Anonymous Posting | Facebook Bug BountyHi guys,Jul 17, 2024Jul 17, 2024
Enhance Your Terminal Experience with Highlight Tools: A Comprehensive Guidehighlight is a script to detect and highlight patterns such as URLs, domains, IPv4 addresses, IPv6 addresses, subnets, ports, categories…Jun 16, 2024Jun 16, 2024
Published inInfoSec Write-upsHow i Find Database Credentials via Mass Recon & Recon Scoping on GcashHi guys,Apr 22, 20249Apr 22, 20249