PinnedHow I Hacked Into a Nationwide University Database System Exposing Thousands of Student RecordsINTRODUCTIONSep 22, 2024A response icon52Sep 22, 2024A response icon52
How to Report a Vulnerability When the Company Has No Responsible Disclosure PolicyA step-by-step guide to responsibly reporting security vulnerabilities when a company has no disclosure policy.Oct 7A response icon3Oct 7A response icon3
How I Found a Critical XSS On a Public Bug Bounty ProgramINTRODUCTIONAug 13A response icon25Aug 13A response icon25
Your Kid Might Be Bypassing Screen Time App Limits on macOS Using This TrickHello everyone, I’m an independent security researcher who’s been diving into Apple macOS and iOS for the past few months. This is a quick…Jun 19A response icon1Jun 19A response icon1
Uncovering Deepseek AI’s Hidden Flaw: A Dive Into Its Response Filtering SystemHello friends, This will be a quick and short writeup on a simple vulnerability I found on deepseek AI.Jan 29Jan 29
$750 Domain Hijacking VulnerabilityA simple P3 on bugcrowdDec 18, 2024A response icon3Dec 18, 2024A response icon3
Published inAWS TipHow I Exploited Amazon Cognito Misconfigurations to Access Confidential S3 DataIntroductionDec 9, 2024A response icon10Dec 9, 2024A response icon10
An IDOR and Auth Bypass That Led to Mass Account Takeover — KSFEINTRODCUTIONNov 6, 2024A response icon6Nov 6, 2024A response icon6
$175 Prototype Pollution Vulnerability — My first bountyINTRODUCTIONOct 2, 2024A response icon6Oct 2, 2024A response icon6
How i discovered my first CVEHere is a brief introduction on me before starting, I’m a 19 y/o Cyber security enthusiast/learner who likes to hunt down bugs as passion…Jun 14, 2024A response icon7Jun 14, 2024A response icon7