Kongsec·FollowJul 13, 2021--ListenShareWhen I pass phone number to username Param it was disclosing entity Id of user in response. I didn't guess algorithm , it was all there
KongsecExploiting Exposed Tokens and API Keys: Edition 2023Introduction: Welcome to my 14th article on exploiting exposed tokens and API keys. In this edition, I will discuss how to approach and…3 min read·Jun 24--1
Mr.HorbioHow to Find First Bug (For Beginners)As a beginner, you try to find bugs in many websites but still you got nothing. You got Demotivation during bug hunting ,Don’t worry when…3 min read·Nov 24--3
Ott3rlyinInfoSec Write-upsMass Hunting XSS vulnerabilitiesIn this article, I would like to cover how it is possible to efficiently check thousands of endpoints for potential Cross Site Scripting…6 min read·Nov 22--4
Tasadduq AliImplementing Google Login in a Node.js ApplicationTo implement Google Login, you need to set up a Google API project. Follow these steps:3 min read·Jul 12--2
TimnikTryHackMe — IDOR WriteUp/Walkthrough with AnswersDetailed Writeup/Walkthrough of the room IDOR from TryHackMe with answers/solutions. You can find the room here.·2 min read·Aug 10--
André PontesHow I got a $500 reward for finding an unacclaimed bucket on GitHubI was researching bug bounty programs and my main focus was finding unacclaimed buckets, when I decided to search within the immunefi.com…2 min read·Nov 16--1
KongsecExploiting Exposed Tokens and API Keys: Edition 2023Introduction: Welcome to my 14th article on exploiting exposed tokens and API keys. In this edition, I will discuss how to approach and…3 min read·Jun 24--1