Recent posts

Day 30/100 Hack and Improvement

less than 1 minute read

Day 30 comes with two resources related to weak cryptography to open redirect and RCE examples for beginners!

Day 29/100 Hack and Improvement

less than 1 minute read

Day 29 comes with examples for weak cryptography that achieves account takeover, and unrestricted file upload which leads RCE.

Day 28/100 Hack and Improvement

less than 1 minute read

Day 28 comes with a good write up about rate limit and captcha bypass, also with deserialization attacks!

Day 27/100 Hack and Improvement

less than 1 minute read

Day 27 comes with a pretty interesting attack called “Pixel that steals your data” and Vulnerability chaining such as Open Redirect and OAuth misconfiguratio...

Day 26/100 Hack and Improvement

less than 1 minute read

Day 26 comes with different a pretty good resource to bypass 2FA and part 2 on S3 buckets misconfigurations!