PinnedHacking API endpoints with IDORHey folks! It’s me, Muhammad Julfikar Hyder(thejulfikar) back again with a new article. I’m writing about an IDOR I identified a few days…Jan 27, 2023A response icon3Jan 27, 2023A response icon3
"sats3yhb4xt6" was indeed a valid ID for an invited user, and it was generated by the application.Oct 30, 2023Oct 30, 2023
Privilege Escalation through ID ReflectionAs technology continues to advance, companies are becoming increasingly reliant on digital systems to store and manage their data. This has…Mar 20, 2023A response icon1Mar 20, 2023A response icon1
Hacking Cambridge University, a simple XSS exploit!Hey hackers! I hope you’re all doing well! Here I am back with another write-up of an easy XSS I found on the University of Cambridge’s…Sep 8, 2021Sep 8, 2021
How I Won My First Bounty In 15 SecondsHello peoples, I’m Muhammad Julfikar Hyder from Bangladesh back again with my first bounty story today. You can also read my previous blog…Aug 8, 2020Aug 8, 2020
How I was able to hack LINE’s bucket.Hello there,May 9, 2020A response icon1May 9, 2020A response icon1