Jahanvi SachdevaNov 11, 20254 min readThe Role of ISO 29147 and 30111 in Enhancing Cybersecurity Strategies for 2026
Anurag TripathiSep 10, 20254 min readTips to climb the leaderboard at Com Olho without losing your why
Jahanvi SachdevaAug 26, 20254 min readHow to Master Time Based SQL Injection Techniques for Ethical Hacking
Aditya KumarJul 29, 20254 min readHow to Begin Your Journey in Ethical Hacking for Mobile Applications
Aditya KumarJan 30, 20253 min readHow to Chain Multiple Vulnerabilities for Maximum Impact in Bug Bounty Hunting
Dipti BhadouriyaJan 7, 20252 min readProblems with Running Your Own Managed Bug Bounty or Responsible Disclosure Programs
Abhinav BangiaNov 12, 20243 min readUnderstanding CVE-2024-6387: A P1 Vulnerability Exposing Systems to Remote Code Execution Risks
Aditya KumarAug 16, 20244 min readUnderstanding OAuth Misconfigurations: Common Pitfalls and How to Avoid Them
Anurag TripathiMay 14, 20242 min readShielding Your WordPress Site:Understanding and Mitigating XML-RPC Vulnerabilities
Abhinav BangiaSep 22, 20233 min readDeciphering Bug Severity in Bug Bounty Programs: A Deep Dive into Impact Assessment
Abhinav BangiaSep 11, 20233 min readUnderstanding Cross-Site Request Forgery (CSRF) Attacks: What You Need to Know
Abhinav BangiaAug 17, 20232 min readCyber Sleuthing: Unveiling Web Vulnerabilities with Burp Suite Mastery
Abhinav BangiaAug 16, 20233 min readUnleashing the Power: The Benefits of a Functional Bug Bounty Program