PinnedPublished inOSCP CheatsheetOSCP CheatsheetI would like to share whatever I have learned during the OSCP course so that others also will get the benefit. Because I have gained the…Aug 1, 201923Aug 1, 201923
AppSec-Code Review & Python automation-story-2This is the sequel of python automation which I had posted earlier. In last blog, I had explained about how to install bodge open-source…Oct 25, 2021Oct 25, 2021
AppSec-Code Review & Python automation-story-1It has been long since I have posted in medium. I have been with my masters in cyber security all these days. However, I managed to come up…Oct 22, 2021Oct 22, 2021
Web application Security-series 1-Authentication bypass test scenariosThis is going to be a series of blogs in web application security test scenarios and this is one of them. As we all know, web applications…Mar 10, 20211Mar 10, 20211
Find the treasure hidden in JavaScriptThis is another bug bounty automation blog explaining my thought process for crawling and enumerating JavaScript file. Modern web…Mar 9, 20213Mar 9, 20213
Bug Bounty Automation for bypassing 403 response type pagesIt has been long since I have posted my blog on security. However, this time I would like to bring you a top of bug bounty. I know!! as a…Mar 8, 20211Mar 8, 20211
Bug Hunting: API secret token leaked in JS fileIn modern-day web applications, critical application development has been done on javascript files. Java script files contain some…Oct 13, 2020Oct 13, 2020
Bug Hunting: Sensitive information exposed in android strings.xml fileString.xml is a single location for various strings your application needs. Here every string has a unique id, this id you use in your…Oct 12, 20201Oct 12, 20201