Welcome Viewer!


Upcoming posts:

* Cocktail of Vulnerabilities - A journey from bypassing login panel to getting root level access on a server
* How I XSS'ed Gmail and other google products
* How Microsoft online services could have been leveraged in Hacking users
* A tale of vulnerabilities in Dell - How a hacker could have impersonated as U.S President to deliver malware
* Remote Code Execution on CERT-EU servers
* How a combination of CSRF + IDOR leads to Accounts Takeover

and some more fascinated findings...

Stay tuned...