How to Pentest Minecraft Proxy and Backend Servers and Fix ThemIn this blog post, I will talk about plugin vulnerabilities, default configuration vulnerabilities and other problems in proxy/backend…Feb 13Feb 13
What is Cyber Threat Intelligence and why it matters?Cyber Threat Intelligence refers to the collection, analysis, and application of information regarding potential or existing cyber threats…Feb 5Feb 5
How to setup Web server? (step-by-step)Hello, today I’ll speak about how to setup web server. First of all I will create a portfolio website on web server for showing it as…Jan 30Jan 30
Best XSS payloads for bypassing CloudflareI have found some payloads that is working for bypassing Cloudflare and I’m listing them here. Cloudflare’s WAF list gets bigger everyday…Dec 29, 2024Dec 29, 2024
How I Discovered a High-Severity Vulnerability to Secretly Read Messages on DiscordDiscord has a feature named “Invite as Guest” on voice channels. When you use it, it will create an invite link and when someone joins thru…Dec 23, 20243Dec 23, 20243
How I Discovered a High-Severity Vulnerability on Discord (and got rewarded)Recently, I found a vulnerability that ratelimits users Discord account and locks their Discord account for minutes/hours for using…Dec 16, 2024Dec 16, 2024