PinnedHow I Prevented a Data Breach by Reporting an IDOR in a System Exposing over 500,000 US PassportsIf we haven’t connected on LinkedIn yet, go ahead and send a request!Aug 14, 20243Aug 14, 20243
PinnedSecuring Data: How I Quickly Accessed 3000 Student Records in under 5 MinutesHi everyone!Oct 23, 20232Oct 23, 20232
Critical Information Disclosure Vulnerability via CNAME (AUTOMATED SCAN)Hi there,Oct 3, 20245Oct 3, 20245
Open S3 Buckets Through ReconnaissanceIn my latest post, I shared my favorite 20 Google Dorks, check it out!!Aug 14, 2024Aug 14, 2024
20 Essential Google Dorking Queries to find vulnerable targetsIf we haven’t connected on linkedIn, go ahead and send me a request, I’d love to connect — My LinkedInAug 9, 2024Aug 9, 2024
Research | The use of AI in Offensive Security | Annotated BibliographyI am working on a research paper on the use of AI in Offensive Security for a school project.Mar 29, 2024Mar 29, 2024
Storing, Accessing, and displaying JSON data in local storage | PeIn my latest post, I shared how I escalated a Critical misconfiguration in Firebase — Bug bounty, If you haven’t read it yet, go ahead and…Feb 21, 20241Feb 21, 20241
Critical misconfiguration in Firebase-Bug bountyI was able to write and dump the databaseNov 25, 20234Nov 25, 20234
LFI to RCE — Bug bountyAlright guys, in my latest post, I shared how a simple SQL query enabled me to take over an account. If you haven’t read it yet, go ahead…Nov 7, 202311Nov 7, 202311
Login Bypass and Full Account Takeover: SQL Exploits — Bug bountyAlright guys,Oct 30, 20233Oct 30, 20233