Hacking HackerOne: How computer vision helped uncover hidden vulnerabilities?Hello everyone! Today, I would like to share my experience using artificial intelligence to scan all the disclosed videos on HackerOne. I…May 11, 20232May 11, 20232
XSS through image proxy using SVG imageHi everyone, today’s story will be short because there are not many details in it.Dec 25, 2021Dec 25, 2021
How I earned $$$$ by Amazon S3 Bucket misconfigurations?Hi all, in this story I will talk about several misconfiguration that I found related to the Amazon S3 Buckets.Jul 28, 20211Jul 28, 20211
IDOR leads to leak medical insurance documentsHi everyone, today I will talk about IDOR vulnerability that I found it in a insurance company that leaks the medical insurance documents…Jul 16, 20211Jul 16, 20211
Bypass rate limit to enumeration users through Google DriveHi everyone, today I’m gonna took about vulnerability that I found it in Google. In fact, when I sent the report to Google, it wasn’t a…Mar 24, 20213Mar 24, 20213
The easiest $2500 I got it from bug bounty programHi all, today I will talk about first vulnerability I found it. At that time, I knew little about information security.Mar 5, 20215Mar 5, 20215
How I hacked IBM and got full access on many services?Hi everyone, today I’m gonna talk about vulnerability that I found it in IBM that allowed me to get full access on many services.Dec 15, 20201Dec 15, 20201