Recommended Blogs
How a little modification of a request parameter led to Unauthorized Access to Private Workspaces
Mohamed Ali
•Apr 5, 2026

How I Got AWS Secret Keys from Exposed Variables in JS File
Mohamed Ibrahim
•Nov 12, 2025
$500 Bounty - How a Logic Flaw Allowed Silent Logins in a Financial Application
luq0x
•Nov 14, 2025