7h3h4ckv157inInfoSec Write-upsCybersecurity 2024: How to Secure an Entry-Level Job as a Hacker!Follow these steps & kick-start your career in cyber-security! (This is for beginners).Apr 53Apr 53
7h3h4ckv157inInfoSec Write-upsHow to start Bug Bounty Hunting $$$$ in 2024?? | A short RoadMapTL;DR: This guide is tailored for complete beginners. Learn how to hunt down digital bugs, improve cybersecurity skills, and earn $$$$$…Apr 11Apr 11
7h3h4ckv157inInfoSec Write-upsDelving into the Depths of NoSQL Injection: A Research Odyssey- 7h3h4ckv157Oct 13, 2023Oct 13, 2023
7h3h4ckv157inInfoSec Write-upsMastering the Realm of GraphQL ExploitationHey Infosec mates,Aug 6, 2023Aug 6, 2023
7h3h4ckv157inInfoSec Write-upsThe Art of G-mail Hacking! → Secrets of Impersonation!- 7h3h4ckv157Jun 9, 20235Jun 9, 20235
7h3h4ckv157inInfoSec Write-upsHow Hackers can exploit Caching x Race-Conditions for followers count manipulation on Twitter- 7h3h4ckv157Jun 3, 2023Jun 3, 2023
7h3h4ckv157inInfoSec Write-upsBreaking Down Barriers : CVE-2023–2227- 7h3h4ckv157May 10, 20231May 10, 20231
7h3h4ckv157inInfoSec Write-upsHacking the Like Functionality of Twitter!Hey InfoSec community,Apr 5, 20235Apr 5, 20235
7h3h4ckv157inInfoSec Write-upsUnveiling the Secrets: My Journey of Hacking Google’s OSS- August 22, 2022Mar 31, 20231Mar 31, 20231