Hacking HackerOne: How computer vision helped uncover hidden vulnerabilities?Hello everyone! Today, I would like to share my experience using artificial intelligence to scan all the disclosed videos on HackerOne. I…May 11, 2023A response icon2May 11, 2023A response icon2
Exploiting Cross Site Scripting (XSS) in Web3IntroductionDec 29, 2022A response icon1Dec 29, 2022A response icon1
XSS through image proxy using SVG imageHi everyone, today’s story will be short because there are not many details in it.Dec 25, 2021Dec 25, 2021
How I earned $$$$ by Amazon S3 Bucket misconfigurations?Hi all, in this story I will talk about several misconfiguration that I found related to the Amazon S3 Buckets.Jul 28, 2021A response icon1Jul 28, 2021A response icon1
IDOR leads to leak medical insurance documentsHi everyone, today I will talk about IDOR vulnerability that I found it in a insurance company that leaks the medical insurance documents…Jul 16, 2021A response icon1Jul 16, 2021A response icon1
Bypass rate limit to enumeration users through Google DriveHi everyone, today I’m gonna took about vulnerability that I found it in Google. In fact, when I sent the report to Google, it wasn’t a…Mar 24, 2021A response icon3Mar 24, 2021A response icon3
The easiest $2500 I got it from bug bounty programHi all, today I will talk about first vulnerability I found it. At that time, I knew little about information security.Mar 5, 2021A response icon5Mar 5, 2021A response icon5
How I hacked IBM and got full access on many services?Hi everyone, today I’m gonna talk about vulnerability that I found it in IBM that allowed me to get full access on many services.Dec 15, 2020A response icon1Dec 15, 2020A response icon1