File Upload Restrictions Bypass in S3 BucketThe target is like a multi-vendor e-commerce website where, there are 2 types of users. Buyers and Sellers. Sellers can setup their…Feb 19Feb 19
Published inSystem WeaknessUsing Tor Network to Bypass Rate LimitsDuring Bug Hunting or Penetration Testing we often come across Rate Limits. These Rate Limits are sometimes IP Based.Jan 20Jan 20
Zero Click Account Takeover in ClassDojo’s Student Login SystemClassDojo is a platform in educational settings that helps teachers, students, and parents stay connected. They run their bug bounty…Jan 203Jan 203
Stabilizing a Reverse Shell for Interactive Access: A Step-by-Step GuidePrerequisitesAug 9, 20232Aug 9, 20232
Difference between new() and make() in GolangGolang is a statically-typed language with a garbage collector that makes it easy to write concurrent programs. In Golang, there are two…Mar 3, 20231Mar 3, 20231
Go struct vs C structIn this article we’ll discuss about the similarities and differences between Go and C’s struct.Dec 31, 2022Dec 31, 2022
Sorting Algorithms in Go : Quick SortQuick sort is a popular sorting algorithm that works by selecting a “pivot” element from the array and partitioning the other elements…Dec 17, 2022Dec 17, 2022