PinnedUpload2Own: How SQL Injection and File Upload Flaws Lead to Remote Code ExecutionA story of persistence, subdomain hunting, and how one file upload gave me RCE on two sites.Jun 10Jun 10
PinnedDiscovering a Critical Vulnerability in application : The Journey of an Accidental AdminDate: June 6, 2024Jun 6, 2024Jun 6, 2024
Building an OS from Scratch (Day 2: Reading Files from Disk and Accepting User Input.)🔧 What We’re Doing TodayJun 5Jun 5
Building a OS from Scratch(Day 1: Hello World )So Lets Start The build For the OS but before it we need to know about the tools we need to use in it . You can Also read it on my notion…Feb 9Feb 9
How I Discovered a Critical Vulnerability in a Message Tracking SystemBug Title: Unauthorized Access and Download of Messages in Message Delivery Tracking System CVSS v4.0 Score: 8.3 / High URL…Jun 14, 2024Jun 14, 2024