PinnedForensic Journey: Decrypting WhatsApp Chats and Analyzing Digital Trails on AndroidUnveiling Conversations: Decrypting WhatsApp Chats on AndroidJul 19, 2023Jul 19, 2023
Discovering an OTP Bypass Bug on INDIAN Government SiteThis story takes place when I was registering for a technical certification course on a state government website, and I stumbled upon an…Sep 28Sep 28
How I Made It Into ASUS’s Hall Of Fame !!!“The persistent hacker turns setbacks into comebacks.”Jun 18Jun 18
EPIC STORY OF CYBERCRIME !!!This incident involves a friend of one of my relatives. The purpose of recounting this story is twofold: to raise awareness among the…Mar 14Mar 14
How I Transformed a Suspicious Phishing URL into a Legitimate URLIn this article, we’ll talk about turning phishing or suspicious links into ones that seem genuine. This is done to carry out a social…Jan 14Jan 14
How I H4CK3D A W3b$it3 in 10 Mins | OWASP Top 10 | Security misconfigurations |Hi, guys! I want to share my experience of hacking a website and how simple security misconfigurations can lead to significant hacking…Oct 27, 2023Oct 27, 2023
Unveiling Vulnerabilities: How I Earned My First Bounty by Securing my Favorite Cyber Security…Photo by Souvik Banerjee on UnsplashJul 13, 20231Jul 13, 20231
Hacking Web-Server Using Images …So you must be wondering how is this possible to compromise a web server using an image ???Nov 19, 2022Nov 19, 2022