PinnedPublished inMeetCyberBogon Address — ExplainedHow to say you’re a hacker… without actually saying it?May 8, 2025A response icon1May 8, 2025A response icon1
PinnedPublished inOSINT TeamHow Many Ethical Hackers Are Out There? A Global Look Through Google Bug Hunters DataUsing OSINT to Explore the Global Impact of Ethical HackersApr 26, 2025Apr 26, 2025
PinnedPublished inOSINT TeamMapping the World’s Ethical Hackers: Insights from HackerOne PlatformInside the Hacker Map: Where Do Ethical Hackers Come From?Apr 27, 2025Apr 27, 2025
PinnedPublished inMeetCyberHow I Found 3x XSS in 6 Seconds! Without Automated ToolsXSS discoveries using manual way — found really quickDec 6, 2024A response icon2Dec 6, 2024A response icon2
Published inInfoSec Write-upsReflected XSS with Base64 — Breaching Obscurity in SecondsWhy “security by obscurity” (yes, base64 too) is a bad idea — explainedNov 24, 2025A response icon2Nov 24, 2025A response icon2
Published inSystem WeaknessReflected XSS with Base64 — Breaching Obscurity in SecondsWhy “security by obscurity” (yes, base64 too) is a bad idea — explainedOct 25, 2025Oct 25, 2025
Published inMeetCyberWhy You Have to Wait for Your CVE: Behind the Scenes of MITRE’s ProcessThe backlog is real, but so is the professionalism behind the curtain.Sep 27, 2025Sep 27, 2025
Published inMeetCyberOne IP, Many People: Why You Can’t Tell Who’s Really Visiting Your WebsiteHow shared home networks blur the lines of digital identity — and what you can do about it.Jun 22, 2025Jun 22, 2025
CTF Writeup — TJCTF 2025 — loopyCapture The Flag. CTF Writeup. TJCTF 2025 challengeJun 11, 2025Jun 11, 2025
CTF Writeup — TJCTF 2025 — hidden-messageCapture The Flag. CTF Writeup. TJCTF 2025 challengeJun 10, 2025Jun 10, 2025