Chaining Multiple Vulnerabilities Leads to Remote Code Execution (RCE).Jenkins RCE through groovy script console.Nov 2, 2022A response icon2Nov 2, 2022A response icon2
Exploiting file upload functionality in unique way.Observe the behavior of your target. You may end up with a unique and cool finding.Jun 19, 2021A response icon2Jun 19, 2021A response icon2
Published inSystem WeaknessStory Behind Sweet SSRF.Persistence is the Key to Success.🔥Jan 20, 2021A response icon6Jan 20, 2021A response icon6
Recon wins - Part 1Can browser extension get you high severity vulnerabilities?Jul 15, 2020A response icon1Jul 15, 2020A response icon1
How I Got Hall of Fame in just Two Minutes.A story behind how I got hall of fame in teamster.app by finding my first broken link hijacking in just two minutes.Jun 29, 2020Jun 29, 2020