Published inInfoSec Write-upsFinding vulnerabilities on flask-cors libraryFinding vulnerabilities on cors librariesDec 31, 2024Dec 31, 2024
Automating CSRF Detection in WordPress Plugins with SemgrepIntroductionNov 1, 2023A response icon1Nov 1, 2023A response icon1
Behind the Bug: Password reset poisoningIntroductionJun 6, 2022A response icon2Jun 6, 2022A response icon2
IDOR in support.mozilla.org through Code ReviewI was trying to improve my static analysis code, specifically django apps, so i decided to hack a random project in github. And i found…Mar 2, 2022Mar 2, 2022
Bookwyrm Server Side Request ForgeryWhile reading the code of bookwyrm, i encounter this endpointFeb 14, 2022Feb 14, 2022
Hacking into school management systems. Reflected XSS To RCEAs a hacker, we are asked a million times before if we can hack into their school system and change their grades.Feb 8, 2022A response icon7Feb 8, 2022A response icon7
Hacking and reverse engineering il2cpp games with ghidraLast writeup, we talk about how to hack unity games compiled on mono. This time, we will be hacking unity games compiled in il2cpp. IL2CPP…Feb 7, 2022A response icon3Feb 7, 2022A response icon3