top of page


Unleashing the Ethical Hacker Within: Cybersecurity Insights, Bug Bounty Tips, and the Art of Penetration Testing
Hello everyone, I hope you all are doing great. I am back with another writeup. It is a write-up about some of my findings so let's...
Nitin Yadav
May 3, 20243 min read
45
0


How I Gained Account Access: Exploring the Risks of Password Reset Links in Cybersecurity
Hello everyone, I hope you all are doing great. I am back with another writeup. So today we are going to talk about another bug that we...
Nitin Yadav
May 2, 20243 min read
108
0

Exposed Secrets: The Peril of Broken Access Control
A Broken access control vulnerability is a type of security flaw that allows an unauthorized user access to restricted resources.
Nitin Yadav
May 1, 20242 min read
106
0

Finding a SQL Injection in a Social Media Website
Hello everyone, We are back again with another writeup. So last week we got a penetration testing project. And this time it's a social...
Nitin Yadav
Apr 30, 20242 min read
116
0

Subdomain Enumeration -Recursive Internet Scanner for Hacking
Hello everyone, We are back again with another writeup. So first let’s talk about our recon process. If you know about scope based Recon...
Nitin Yadav
Apr 30, 20242 min read
15
0

Top Antivirus Programs of 2023: Protecting Computers with Malware Protection and Real-time security
What if I told you there was a way to keep your computer malware free and protect it against the latest threats? The answer is simple:...
Nitin Yadav
Jan 25, 20235 min read
31
0
bottom of page