Hello, Guys, I m back with a new blog on bug bounty, I found this bug recently on independent bug bounty program, thought of sharing
I am a Cyber Security Enthusiast and a Hacker with an Ethical mindset.
I m having experience in Web-app security, Mobile app security, API security, Source code analysis, Network Security, Vulnerability Assessment & Penetration Testing. I am experienced with tools like burp suite,acunetix, Nessus, IBM AppScan, Nmap, Pentest tools, Postman, Frida, Drozer, Siem tools and of course with Kali Linux & some GitHub open source tools like Amass, Aquatone...etc many more for finding the vulnerabilities in the web application and mobile application. Now what type of vulnerabilities I have found frequently will be account takeover, injections, privilege escalation, series of vulnerabilities leading to account takeover, LFI, XSS, OWASP Top 10 ...etc.
Skills & abilities
Jobs & Education
Application Security Analyst
Independent Security Researcher
Business Development Manager
B.Tech Computer Science & Engineering
Hobbies & Interests
Hello Guys, Ninad here I hope you are doing good, so today's topic is How to start with web application pen-testing. I would be dividing
Hello people, hope you are doing good and playing well with security! Today I am here again with a topic known as Insecure Direct Object
Hello guys welcome to my blog, Let me tell this is my first blog and will be further writing more blogs on critical vulnerabilities that
Hello people, hope you are doing good and playing well with security! Today I am here again with a topic known as SSL pinningWhat is
[vc_row][vc_column][vc_column_text] Hello Guys, took a bit long, but as I said here is the 2nd part of web application pen-testing methodology Before going for client-side