PinnedHacking API endpoints with IDORHey folks! It’s me, Muhammad Julfikar Hyder(thejulfikar) back again with a new article. I’m writing about an IDOR I identified a few days…Jan 27, 20233Jan 27, 20233
"sats3yhb4xt6" was indeed a valid ID for an invited user, and it was generated by the application.Oct 30, 2023Oct 30, 2023
Privilege Escalation through ID ReflectionAs technology continues to advance, companies are becoming increasingly reliant on digital systems to store and manage their data. This has…Mar 20, 20231Mar 20, 20231
Hacking Cambridge University, a simple XSS exploit!Hey hackers! I hope you’re all doing well! Here I am back with another write-up of an easy XSS I found on the University of Cambridge’s…Sep 8, 2021Sep 8, 2021
How I Won My First Bounty In 15 SecondsHello peoples, I’m Muhammad Julfikar Hyder from Bangladesh back again with my first bounty story today. You can also read my previous blog…Aug 8, 2020Aug 8, 2020