PinnedHow I Hacked Into a Nationwide University Database System Exposing Thousands of Student RecordsINTRODUCTIONSep 22, 2024A response icon49Sep 22, 2024A response icon49
Your Kid Might Be Bypassing Screen Time App Limits on macOS Using This TrickHello everyone, I’m an independent security researcher who’s been diving into Apple macOS and iOS for the past few months. This is a quick…1d agoA response icon11d agoA response icon1
Uncovering Deepseek AI’s Hidden Flaw: A Dive Into Its Response Filtering SystemHello friends, This will be a quick and short writeup on a simple vulnerability I found on deepseek AI.Jan 29Jan 29
$750 Domain Hijacking VulnerabilityA simple P3 on bugcrowdDec 18, 2024A response icon3Dec 18, 2024A response icon3
Published inAWS TipHow I Exploited Amazon Cognito Misconfigurations to Access Confidential S3 DataIntroductionDec 9, 2024A response icon10Dec 9, 2024A response icon10
An IDOR and Auth Bypass That Led to Mass Account Takeover — KSFEINTRODCUTIONNov 6, 2024A response icon6Nov 6, 2024A response icon6
$175 Prototype Pollution Vulnerability — My first bountyINTRODUCTIONOct 2, 2024A response icon6Oct 2, 2024A response icon6
How i discovered my first CVEHere is a brief introduction on me before starting, I’m a 19 y/o Cyber security enthusiast/learner who likes to hunt down bugs as passion…Jun 14, 2024A response icon7Jun 14, 2024A response icon7
LLM Sanitizer — Real World CTF (2024) walkthroughHello friends 👋,Jan 28, 2024A response icon4Jan 28, 2024A response icon4
hekerCTF 2024: WalkthroughHello, Myself a cybersecurity student who is currently pursuing BCA in cloud computing, cybersecurity and Ethical hacking. and CEHv12.Jan 11, 2024A response icon2Jan 11, 2024A response icon2