Published inInfoSec Write-upsCritical Security Findings at the University of Cambridge: A Methodology for Detecting Exposed…How I discovered two critical vulnerabilities that exposed sensitive credentials and led to unauthorized access.Nov 6Nov 6
Published inSystem WeaknessJSLeakRecon: The Ultimate Tool for Detecting Potential Leaks in JavaScript FilesQuickly Identify Hardcoded Credentials, API keys, Access Tokens, Secret keys, and Critical security issues in JavaScript FilesNov 6Nov 6
Published inSystem WeaknessHacking Real-world AI Systems: The Art of Prompt Injection Attacks — Part 1Ready to Hack AI models? Learn How to Hack AI Systems and Access Sensitive Data. Discover How Prompt Injection Can Give You the Secret…Oct 9Oct 9
Published inInfoSec Write-upsHow I was able to find multiple vulnerabilities of a Symfony Web Framework web applicationFound high severity vulnerability in 5 minutes just from reconnaissance. Found multiple vulnerabilities on a web application that used the…Jan 23, 20222Jan 23, 20222