top of page


Bug Bounty Tips: How to Succeed in Ethical Hacking | Begineer's guide | PART 1
Hello everyone, I hope you all are doing great. I am back with another writeup. Every day I see many people asking questions about bug...
Nitin Yadav
May 6, 20244 min read
82
0


Unleashing the Ethical Hacker Within: Cybersecurity Insights, Bug Bounty Tips, and the Art of Penetration Testing
Hello everyone, I hope you all are doing great. I am back with another writeup. It is a write-up about some of my findings so let's...
Nitin Yadav
May 3, 20243 min read
45
0


How I Gained Account Access: Exploring the Risks of Password Reset Links in Cybersecurity
Hello everyone, I hope you all are doing great. I am back with another writeup. So today we are going to talk about another bug that we...
Nitin Yadav
May 2, 20243 min read
108
0


Exposed Secrets: The Peril of Broken Access Control
A Broken access control vulnerability is a type of security flaw that allows an unauthorized user access to restricted resources.
Nitin Yadav
May 1, 20242 min read
108
0


Finding a SQL Injection in a Social Media Website
Hello everyone, We are back again with another writeup. So last week we got a penetration testing project. And this time it's a social...
Nitin Yadav
Apr 30, 20242 min read
116
0


Subdomain Enumeration -Recursive Internet Scanner for Hacking
Hello everyone, We are back again with another writeup. So first let’s talk about our recon process. If you know about scope based Recon...
Nitin Yadav
Apr 30, 20242 min read
17
0
bottom of page