Placeholder image

Hello luves, 

this post is just a mirror to my five weeks to your first bug challenge. A mini seri on getting into bug bounty hunting. this guide aim to help absolute beginners .

...
Placeholder image

Hello, luvs,

I haven't blog for a while, we are facing a sad pandemic  😷so I've decided to create this to make an important announcement, and also entertain you with an interes...

Placeholder image

Hello luvs, this article is about one of my very recent private security assessments on a gigantic service provider, to keep them safe we use REDACTED whenever we talk about them.  P...

Placeholder image

Hello, luvs, information security training, and certificates have been a lengthy debate over the years. In this post, I like to take you with me to my journey around this subject, it's bee...

Placeholder image

Hello Luvs,

Thousands of websites use Django from personal to cryptocurrency APIs I consider Django a reasonably secure framework. Even our cases study vulnerability discovered by the Djang...

Placeholder image

Hello Luvs,

This post is just another brain dump, like the last post. Today we are going to talk about mass exploitation. Criminals usually use mass exploitation to control as much as hosts...