Bypassing Promo Code Validation via Response Manipulation Enabled the Creation of a Business….بِسْمِ اللَّهِ الرَّحْمَٰنِ الرَّحِيمِ، وَالصَّلَاةُ وَالسَّلَامُ عَلَىٰ رَسُولِ اللَّهِNov 6Nov 6
IDOR Vulnerability Allowed the Deletion of Any User from an Administrator Account..بِسْمِ اللَّهِ الرَّحْمَٰنِ الرَّحِيمِ، وَالصَّلَاةُ وَالسَّلَامُ عَلَىٰ رَسُولِ اللَّهِNov 63Nov 63
My First Bounty: How I Exploited a CORS Misconfiguration.بِسْمِ اللَّهِ الرَّحْمَٰنِ الرَّحِيمِ، وَالصَّلَاةُ وَالسَّلَامُ عَلَىٰ رَسُولِ اللَّهِSep 36Sep 36
Python — SSTI | Root Me Web ChallengeHi everyone, in this write-up I’ll explain the solution to the Python — Server-side Template Injection Introduction challenge hosted on…Mar 13Mar 13
Arab Regional Cybersecurity CTF 2023 (Web Security & Machines)We Stand with Palestine and don’t recognize a country called Israel.Oct 22, 2023Oct 22, 2023