Breaking into the Classroom: A Glimpse into Hacking a Leading EdTech PlatformIn the world of ethical hacking, sometimes the most secure-looking platforms have hidden vulnerabilities waiting to be discovered. That’s…Aug 18, 2024Aug 18, 2024
Exploring Subdomains: From Enumeration to Takeover VictoryIn the name of ALLAH, the most gracious, the most merciful.Aug 16, 2024Aug 16, 2024
What Comes After Recon: My Journey with Public Bug Bounty Program HuntingIn the Name of Allah, the Most Beneficent, the Most MercifulAug 16, 2024Aug 16, 2024
Your AI Conversations Aren’t Safe: How We Stole ThemHello, fellow hackers! Recently, my friend Walid Mohammed (L0da) and I delved into a private bug bounty program on HackerOne. Our target…Aug 3, 2024Aug 3, 2024
0-Click ATO Due to Weak Reset Password Tokens and Lack of Rate LimitingIn our latest cybersecurity research, we discovered a significant vulnerability in the password reset functionality of a well-known…Jul 28, 20243Jul 28, 20243