Hemdeep GamitinSystem WeaknessBreaking Business Logic - Part: 2^7 = 1Hello Hunters & Ninjas, In a very short span of time this article has been published because I’m a very consistent person in writing blogs…3 min read·Oct 2, 2022--1--1
Hemdeep GamitinSystem WeaknessBypassing File Upload Restriction using Magic BytesHello Hunters & Ninjas, Article is very late, for that accept my apology. Today I’m going to write about one of my findings in which an…3 min read·Apr 30, 2022--5--5
Hemdeep GamitCross Site Port Attack in WildHello Hunter, Sorry for the delay of post and this is my first post in this year, I hope you’re all doing well and happy. So without…3 min read·Jan 18, 2022--1--1
Hemdeep GamitMisconfigured Social Login(OAuth) Leads to Permanent account accessHello Hunters, This article is about one of my finding in which an user can access the account which is not belong to him via social login…2 min read·Nov 24, 2021----
Hemdeep GamitPre-Authentication Account Take-OverHello Hunters, Today I’m going to tell about one of my interesting and rare finding which is Pre-Authentication Account Take-Over.4 min read·Nov 19, 2021----
Hemdeep GamitOTP Bypass via response manipulationHello Hunters, today I'm going tell about my one of the finding in which I'm able to bypass the OTP page. So let’s begin.2 min read·Nov 13, 2021--2--2
Hemdeep GamitEmail Validation BypassHello Everyone, I’m Hemdeep Gamit, I'm Indian Security Researcher, I hope you’re all doing well, this my first article so please just do…1 min read·Nov 9, 2021--1--1