From the moment I realized hackers are real and not just fictional villains, I’ve been drawn into this rabbit hole. I try to see things from their perspective—not for personal gain, but to protect you.
I am available for gigs, collaborations, and full-time roles.
Jan 17 · 13 min read · Task 1: Introduction What is File inclusion?This room aims to equip you with the essential knowledge to exploit file inclusion vulnerabilities, including Local File Inclusion (LFI), Remote File Inclusion (RFI), and directory traversal. Also, we will ...
Join discussion
Jan 15 · 2 min read · Broken Access Control Broken access control is a security failure that occurs when an application fails to properly enforce restrictions, allowing users to perform actions or access data outside of their intended permissions. This is when a website’s...
Join discussion
Jan 6 · 4 min read · Task 1: What is an IDOR? IDOR stands for Insecure Direct Object Reference and is a type of access control vulnerability.This type of vulnerability can occur when a web server receives user-supplied input to retrieve objects (files, data, documents), ...
Join discussion