PinnedPublished inInfoSec Write-upsUtilizing AI Model for Hacking: Bypassing CAPTCHAs using AI leads to Account Takeover | Bug BountyLeveraging AI for CAPTCHA bypass opens the door to potential vulnerabilities, revealing critical flaws in web security.Oct 1, 2024A response icon4Oct 1, 2024A response icon4
Published inInfoSec Write-upsHow i Access The Deleted Files of Someone in Google Drive | Bug BountyThe Illusion of Deletion: How Trashed Files in Google Drive Can Still Be Accessed — Understanding Google Drive’s Trashed File AccessibilityApr 28A response icon4Apr 28A response icon4
Published inInfoSec Write-upsBypass File Attachment Restrictions in Google Groups via Email Posting | Bug BountyIntroductionApr 13A response icon1Apr 13A response icon1
Published inInfoSec Write-ups1-CLick OAuth Token Hijacking via Google Apps Script – A Design Flaw Ignored? | Bug BountyIntroductionApr 13Apr 13
Practical Web Pentest Professional (PWPP) | TCM Security Certification ReviewPractical Web Pentest Tester (PWPP)/Practical Web Pentest Professional (PWPT) — TCM Security Certification ReviewMar 25Mar 25
Published inInfoSec Write-upsFacebook Text Injection Vulnerability: A Creative Approach | Bug BountyHi Guys, In this write-up, we’ll walk through the steps we took to identify the vulnerability of a simple text injection and how we…Jan 6A response icon8Jan 6A response icon8
Published inInfoSec Write-upsBypassing Account Suspension Using Anonymous Posting | Facebook Bug BountyHi guys,Jul 17, 2024Jul 17, 2024
Enhance Your Terminal Experience with Highlight Tools: A Comprehensive Guidehighlight is a script to detect and highlight patterns such as URLs, domains, IPv4 addresses, IPv6 addresses, subnets, ports, categories…Jun 16, 2024Jun 16, 2024
Published inInfoSec Write-upsHow i Find Database Credentials via Mass Recon & Recon Scoping on GcashHi guys,Apr 22, 2024A response icon9Apr 22, 2024A response icon9
How i Manage to Get Sensitive Informations via docker imageHi guys,Apr 18, 2024A response icon6Apr 18, 2024A response icon6