Published inSystem WeaknessBreaking Business Logic — Part: 42–4= 2Hello Hunters & Ninjas, Now I’m back with my new write-up, First of all request to accept my apology friends for this too late write-up…Jun 132Jun 132
Published inSystem WeaknessBreaking Business Logic - Part: 2^7 = 1Hello Hunters & Ninjas, In a very short span of time this article has been published because I’m a very consistent person in writing blogs…Oct 2, 20221Oct 2, 20221
Published inSystem WeaknessBypassing File Upload Restriction using Magic BytesHello Hunters & Ninjas, Article is very late, for that accept my apology. Today I’m going to write about one of my findings in which an…Apr 30, 20225Apr 30, 20225
Cross Site Port Attack in WildHello Hunter, Sorry for the delay of post and this is my first post in this year, I hope you’re all doing well and happy. So without…Jan 18, 20221Jan 18, 20221
Misconfigured Social Login(OAuth) Leads to Permanent account accessHello Hunters, This article is about one of my finding in which an user can access the account which is not belong to him via social login…Nov 24, 2021Nov 24, 2021
Pre-Authentication Account Take-OverHello Hunters, Today I’m going to tell about one of my interesting and rare finding which is Pre-Authentication Account Take-Over.Nov 19, 2021Nov 19, 2021
OTP Bypass via response manipulationHello Hunters, today I'm going tell about my one of the finding in which I'm able to bypass the OTP page. So let’s begin.Nov 13, 20213Nov 13, 20213
Email Validation BypassHello Everyone, I’m Hemdeep Gamit, I'm Indian Security Researcher, I hope you’re all doing well, this my first article so please just do…Nov 9, 20211Nov 9, 20211