Unauthorized Access to the Uploads Directory in Web ApplicationsRecently, I discovered a critical flaw in a web application that allowed unauthorized access to its uploads directory, exposing sensitive…Feb 11Feb 11
Microsoft Message Queuing (MSMQ) Remote Code Execution (RCE) VulnerabilityRemote Code Execution (RCE) vulnerabilities are among the most critical threats in the cybersecurity landscape. Recently, while testing a…Jan 21Jan 21
Discovering Sensitive Information Exposure via URL ManipulationRecently, during one of my testing sessions, I stumbled upon a critical vulnerability that exposed sensitive user information. Here’s how I…Jan 8Jan 8
Cookie Replay 🍪🔓When conducting penetration tests, sometimes the simplest methodologies can yield the most profound results. While testing a well-secured…Dec 27, 2024Dec 27, 2024
Access Granted !As a cybersecurity enthusiast and bug bounty hunter, there’s no better feeling than discovering a critical vulnerability that contributes…Dec 26, 2024Dec 26, 2024
My First Bug BountyFinding bugs in public bug bounty platforms can be an arduous task. After countless sessions of trying and giving up , I decided to change…Jul 10, 20241Jul 10, 20241