Published inInfoSec Write-upsCritical Bug Bounty Reports: Part 1Short Write-Ups On P1/Critical Bugs I’ve Submitted to Bounty ProgramsJul 11, 20212Jul 11, 20212
Published inInfoSec Write-upsReflected XSS Through Insecure Dynamic LoadingFinding A Unique and Complex Payload To Load Remote ScriptsJul 11, 2021Jul 11, 2021
Published inInfoSec Write-upsExecuting CSRF With Phone ValidationHow to Programmatically Harvest the OTPJun 4, 2021Jun 4, 2021
Published inInfoSec Write-upsExploiting Imported Libraries to Bypass WAFTurning a P5 Content Injection into P3 Reflected XSSJul 14, 2020Jul 14, 2020