The Rise and Fall of Sabu: From Hacker Hero to FBI Informant
In this article, we explore the fascinating life of Hector Xavier Monsegur, also known as Sabu, a former member of the hacking collectives Anonymous and LulzSec. Sabu gained notoriety in 2011 for leading a series of high-profile cyber-attacks…
Primer on Broken Access Control vulnerabilities and how to find them
In this write-up, we will be focusing on broken access control vulnerabilities and providing multiple examples of how to detect them.
GoLogin vs. MultiLogin vs. MuLogin: Similarities and Differences for the Best Results
Most browsers are free to use, and it is very convenient for people. However, there is another side of the coin – using something for free on the Internet can be dangerous for your private information and identity.
Major Cyber Attacks of 2022
In this article we discuss the major Cyber Attacks that shaped 2022. You’ll get informed about the top hacking incidents, including breaches, ransomware attacks, hacking campaigns and more.
Operation OpRussia – Anonymous attacks on Russia
In this article we explore some of the attacks that Anonymous did against Russia in response to the Russian invasion in Ukraine.
Identify and Exploit LFI (Local File Inclusion) Vulnerabilities
In this write up, we’ll show you how to identify and exploit LFI Vulnerabilities. We will also discuss their impact and how to mitigate them with examples.
Using VPS for Bug Bounty, comparing VPS providers
Exploit XSS Injections with a Powerful One-Line Technique
In this article, we’ll demonstrate practical methods for detecting and exploiting Cross-Site Scripting (XSS) injections. These techniques can be applied during source code security reviews to enhance speed and accuracy in your methodology, benefiting both security professionals and bug bounty hunters.