Published inInfoSec Write-upsThe Art of Breaking AI: Exploitation of large language modelsHey, Hackers! 👋Feb 17A response icon1Feb 17A response icon1
Published inInfoSec Write-upsCybersecurity 2024: How to Secure an Entry-Level Job as a Hacker!Follow these steps & kick-start your career in cyber-security! (This is for beginners).Apr 5, 2024A response icon4Apr 5, 2024A response icon4
Published inInfoSec Write-upsHow to start Bug Bounty Hunting $$$$ in 2024?? | A short RoadMapTL;DR: This guide is tailored for complete beginners. Learn how to hunt down digital bugs, improve cybersecurity skills, and earn $$$$$…Apr 1, 2024A response icon1Apr 1, 2024A response icon1
Published inInfoSec Write-upsDelving into the Depths of NoSQL Injection: A Research Odyssey- 7h3h4ckv157Oct 13, 2023Oct 13, 2023
Published inInfoSec Write-upsMastering the Realm of GraphQL ExploitationHey Infosec mates,Aug 6, 2023Aug 6, 2023
Published inInfoSec Write-upsThe Art of G-mail Hacking! → Secrets of Impersonation!- 7h3h4ckv157Jun 9, 2023A response icon5Jun 9, 2023A response icon5
Published inInfoSec Write-upsHow Hackers can exploit Caching x Race-Conditions for followers count manipulation on Twitter- 7h3h4ckv157Jun 3, 2023Jun 3, 2023
Published inInfoSec Write-upsBreaking Down Barriers : CVE-2023–2227- 7h3h4ckv157May 10, 2023A response icon1May 10, 2023A response icon1
Published inInfoSec Write-upsHacking the Like Functionality of Twitter!Hey InfoSec community,Apr 5, 2023A response icon5Apr 5, 2023A response icon5