PinnedMy first bounty, IDOR + Self XSS [€3000]Every hacker would have come across this, the first bounty. I can’t actually explain how it feels but I know that most of you can…Feb 2, 2022A response icon2Feb 2, 2022A response icon2
Mandatory Security Certifications — 2025As a Senior Software Security Engineer who has reviewed countless resumes and built security teams at some of the world’s largest tech…Oct 16Oct 16
AWS Security GuideThis guide provides a comprehensive overview of AWS security best practices, services, and strategies to help you secure your cloud…Oct 13Oct 13
API Security: A Crucial Component of Modern Application DevelopmentIn today’s interconnected world, APIs (Application Programming Interfaces) have become the backbone of many modern applications. They…Dec 26, 2024Dec 26, 2024
Insecure Java DeserializationIn this content, we’ll be covering serialization and deserialization, how they can be used to cause severe damage to the application when…Mar 5, 2022Mar 5, 2022
What’s next? Smart contract securityMy security journey started with web application security and went really good but one day I felt that are we stuck somewhere? are we…Feb 19, 2022Feb 19, 2022
Digging the CSRF deeperCross-site request forgery (also known as CSRF) is a web security vulnerability that allows an attacker to induce users to perform actions…Jan 28, 2022A response icon1Jan 28, 2022A response icon1