500$ From Meta by reporting a HTMLi(Accidental Bug)This is maybe the shortest article on my medium blog, this is all about a simple “HTMLi on Messenger Group (Nickname)”.Aug 165Aug 165
Chaining CVE-2024–24919 (Checkpoint Security Gateway) Local file inclusion vulnerability for better…In 28 April of 2024, NVD Published a CVE for Check Point Security Gateways LFI (Local file inclusion). More depth detail can be found at…Jun 1Jun 1
AI-Powered Phishing: The New Frontier of CybercrimeGenerative AI is a very hyped topic nowadays. People are using generative AI for many purposes, such as generating articles, writing code…May 1May 1
Creating Mini C2 Agent & Server Using Golang & Flask (Mini C2)In general term C2 is an infrastructure used by attacker to manage & control malicious program they distribute & by AGENT I meant the…Feb 241Feb 241
Understanding RSA and It’s Security IssueFirst Let’s try to understand what the hell is RSA, and why it’s RSA?Nov 23, 2023Nov 23, 2023
Published inCoinmonksCreating a AI Based Malware, By Reversing a online Code Generator Chatbot[ This Article is for Educational Purpose only, I am Just Sharing My Research, If anyone use these method to do something illegal or…Sep 27, 2023Sep 27, 2023
Calculation for Shodan API Key Bruteforce (Not really)I was laying in the bed with my laptop, suddenly i thought about searching something on shodan, i browsed to shodan.io and clicked my…Sep 16, 2022Sep 16, 2022
Hacking RTSP (Pwning RTSP)RTSP Known as Real time Streaming Protocol, It’s based on http protocol, and commonly used for streaming media content. This protocol…Sep 8, 20221Sep 8, 20221
what is google colab? & Using it as a free RDPWhat is colab? free rdp using colab.Dec 27, 20211Dec 27, 20211
Creating a Php Based Application find POC/Exploit from github by CVE-IDIn April 9 2021 , I created an cli based python3 application named git-cve, git-cve can search for Exploit/poc for defined CVE-ID . But I…Nov 28, 2021Nov 28, 2021