Is Someone Brute-Forcing the Token Here?This looks suspicious, haha! But let’s get straight to the point.Feb 22A response icon3Feb 22A response icon3
It is impossible for this forensic to be of high difficultySummaryFeb 21A response icon1Feb 21A response icon1
Discovered 30 BOLA + IDOR vulnerabilities in a single subdomain (BBP).In this article, I’ll walk you through how I identified over 30 BOLA (Broken Object Level Authorization) and IDOR (Insecure Direct Object…Dec 30, 2024A response icon7Dec 30, 2024A response icon7
How to Make Money with WebSocket: 10 Vulnerabilities You Should Be Aware OfWhat is WSS?Dec 23, 2024A response icon1Dec 23, 2024A response icon1
Identifying and Exploiting SQL Injection Vulnerabilities### How to Search for SQL Injection Vulnerabilities (High-Scope Method)Aug 14, 2024A response icon2Aug 14, 2024A response icon2
How did I get 3300$ With Just FFUF!!By searching inside one of the Bitcoin platforms I found there a place to document accounts by sending documents such as ID or passport…Jul 2, 2023A response icon5Jul 2, 2023A response icon5
EZ 100$ with Change the account name after authenticating itHello, I found out that it is possible to change the name of the account after creating it This feature is not available on the site…Apr 9, 2023Apr 9, 2023
Content length restriction bypass can lead to DOSYou specified while sending a message that did not specify the size of the text being sent This problem may lead to a defectFeb 21, 2021Feb 21, 2021