From User to Admin: A Privilege Escalation via Business LogicExploit a Privilege Escalation via Business Logic that allowed me to gain admin permissions.Mar 10A response icon5Mar 10A response icon5
How Bug Bounty Programs Scam Hackers and Get Away With It!Hi, my name is Sirat and I am an active hacker on HackerOne platform. Today I wanted to share this story and talk about some kind of scam…Mar 1A response icon10Mar 1A response icon10
How to crawl a website like a proMy methology to crawl websites.Feb 20A response icon2Feb 20A response icon2
The Rate Limit bypass which almost killed my brainMy name is Sirat, im an active bug hunter on hackerone. I have previously shared some rate limit stories and how to bypass them, today I…Jan 8A response icon2Jan 8A response icon2
Weirdest access control vulnerability I have ever found…My name is Sirat, Im an active bug bounty hunter on Hackerone, in this story I would like to share a story about finding an access control…Dec 30, 2024A response icon2Dec 30, 2024A response icon2
Race condition to bypass email verify, part #2The fantasy way to hack your crushSep 1, 2024A response icon3Sep 1, 2024A response icon3
Using ChatGPT for Bug Bounty and finding vulnerabilitiesHow to use ChatGPT for better performance in bug bounty and cyber securityJul 7, 2024Jul 7, 2024
Race Condition Vulnerability to bypass email confirmationHigh Severity Race Condition VulnerabilityJun 28, 2024A response icon5Jun 28, 2024A response icon5
The Exploitation of Massive Slack Workspaces Registration VulnerabilityGreetings, fellow cyber voyagers!Feb 27, 2024A response icon2Feb 27, 2024A response icon2