Discovered 30 BOLA + IDOR vulnerabilities in a single subdomain (BBP).In this article, I’ll walk you through how I identified over 30 BOLA (Broken Object Level Authorization) and IDOR (Insecure Direct Object…Dec 30, 20247Dec 30, 20247
How to Make Money with WebSocket: 10 Vulnerabilities You Should Be Aware OfWhat is WSS?Dec 23, 20241Dec 23, 20241
Identifying and Exploiting SQL Injection Vulnerabilities### How to Search for SQL Injection Vulnerabilities (High-Scope Method)Aug 14, 20242Aug 14, 20242
How did I get 3300$ With Just FFUF!!By searching inside one of the Bitcoin platforms I found there a place to document accounts by sending documents such as ID or passport…Jul 2, 20235Jul 2, 20235
EZ 100$ with Change the account name after authenticating itHello, I found out that it is possible to change the name of the account after creating it This feature is not available on the site…Apr 9, 2023Apr 9, 2023
Content length restriction bypass can lead to DOSYou specified while sending a message that did not specify the size of the text being sent This problem may lead to a defectFeb 21, 2021Feb 21, 2021