PinnedPublished inInfoSec Write-upsExploiting XSS with Javascript/JPEG PolyglotWhat is a polyglot?Apr 8, 20226Apr 8, 20226
Published inInfoSec Write-upsBroken Object Level Authorization Vs. Broken Functionality Level Authorization | API Hacking |In this blog, we will explore two significant security vulnerabilities: Broken Object Level Authorization (BOLA) and Broken Functionality…Oct 17, 20231Oct 17, 20231
Published inInfoSec Write-upsHow to Discover API Subdomains? | API Hacking |In this article, we will delve into the world of API subdomains, exploring their purpose, methods to discover them, and performing API…Sep 27, 20232Sep 27, 20232
Published inInfoSec Write-upsBypass JWT Authentication | Access Admin PanelServers typically do not store the information contained in JSON web token. They simply verify and decode the token and then authenticate…May 11, 20232May 11, 20232
Published inInfoSec Write-upsExploiting SQL Injection in Graphql | DVGA |This article covers exploiting SQL Injection manually in a Graphql Application.Mar 2, 2023Mar 2, 2023
Published inInfoSec Write-upsHow Capabilities actually Work ? | Exploitation | Privilege EscalationDec 20, 20222Dec 20, 20222
C Programming Puzzles That Will Surprise You!In this blog, we will see some exciting C programs, I want you to look at those programs and try to guess the output without executing. But…Sep 24, 20221Sep 24, 20221
Published inSystem WeaknessCreating a Malicious PDF File to launch a Phishing AttackPDF is a very popular document format and is trusted among users, so it’s easy to manipulate users to open a pdf and perform some actions.Jul 27, 20221Jul 27, 20221
Published inSystem WeaknessExploiting Stack Buffer Overflow| Step by Step | Reverse EngineeringIn this blog, we are going to see every step that is required to exploit Stack Buffer Overflow with the help of Immunity Debugger.Jul 10, 2022Jul 10, 2022