PinnedPublished inOSCP CheatsheetOSCP CheatsheetI would like to share whatever I have learned during the OSCP course so that others also will get the benefit. Because I have gained the…Aug 1, 2019A response icon23Aug 1, 2019A response icon23
AppSec-Code Review & Python automation-story-2This is the sequel of python automation which I had posted earlier. In last blog, I had explained about how to install bodge open-source…Oct 25, 2021Oct 25, 2021
AppSec-Code Review & Python automation-story-1It has been long since I have posted in medium. I have been with my masters in cyber security all these days. However, I managed to come up…Oct 22, 2021Oct 22, 2021
Web application Security-series 1-Authentication bypass test scenariosThis is going to be a series of blogs in web application security test scenarios and this is one of them. As we all know, web applications…Mar 10, 2021A response icon1Mar 10, 2021A response icon1
Find the treasure hidden in JavaScriptThis is another bug bounty automation blog explaining my thought process for crawling and enumerating JavaScript file. Modern web…Mar 9, 2021A response icon3Mar 9, 2021A response icon3
Bug Bounty Automation for bypassing 403 response type pagesIt has been long since I have posted my blog on security. However, this time I would like to bring you a top of bug bounty. I know!! as a…Mar 8, 2021A response icon1Mar 8, 2021A response icon1
Bug Hunting: API secret token leaked in JS fileIn modern-day web applications, critical application development has been done on javascript files. Java script files contain some…Oct 13, 2020A response icon1Oct 13, 2020A response icon1
Bug Hunting: Sensitive information exposed in android strings.xml fileString.xml is a single location for various strings your application needs. Here every string has a unique id, this id you use in your…Oct 12, 2020A response icon1Oct 12, 2020A response icon1