Hi, I hope you’re doing well. In this article I am going to illustrate few different type of CSRF attacks. To start with, A CSRF …
Read moreHi, I hope you’re doing well. In this article I am going to illustrate few different type of CSRF attacks. To start with, A CSRF …
Read moreBasically, the break through is pretty simple. We need to upload the txt file with HTML contents and the tmp.txt will act as a HT…
Read moreThis article is for newbies like me whom are interested in building their own automation process in bug bounty. If you're a P…
Read moreAssalamualaikum, This write-up is about bypassing Cloudflare and getting origin servers. Description: Cloudflare is a secur…
Read moreI am getting bored in my room, So i think it would be better to write something about bug bounty. I found this vulnerability…
Read more