Published inInfoSec Write-upsCritical Security Findings at the University of Cambridge: A Methodology for Detecting Exposed…How I discovered two critical vulnerabilities that exposed sensitive credentials and led to unauthorized access.Nov 6, 2024Nov 6, 2024
Published inSystem WeaknessJSLeakRecon: The Ultimate Tool for Detecting Potential Leaks in JavaScript FilesQuickly Identify Hardcoded Credentials, API keys, Access Tokens, Secret keys, and Critical security issues in JavaScript FilesNov 6, 2024Nov 6, 2024
Published inSystem WeaknessHacking Real-world AI Systems: The Art of Prompt Injection Attacks — Part 1Ready to Hack AI models? Learn How to Hack AI Systems and Access Sensitive Data. Discover How Prompt Injection Can Give You the Secret…Oct 9, 2024Oct 9, 2024
Published inInfoSec Write-upsHow I was able to find multiple vulnerabilities of a Symfony Web Framework web applicationFound high severity vulnerability in 5 minutes just from reconnaissance. Found multiple vulnerabilities on a web application that used the…Jan 23, 20222Jan 23, 20222