
Latest
Jan
29

Introduction to Cybersecurity
Get an in-depth understanding of Cybersecurity with our latest article. Learn about the different branches, technologies, career paths, and skills needed to succeed in the field. A must-read for anyone interested in pursuing a career in Cybersecurity.
6 min read
Jan
25

Maximizing OpenAI's Potential: A Python-based Guide to Generating Pretrained Text
OpenAI's API is a powerful tool for natural language processing and text generation. With just a few lines of code,
4 min read
Jan
23

eLFI already solved it, better get going #BUGCROWD Challenge
In this Write-Up, I am going to walk you through the bugcrowd’s open challenge to hackers.
* Note: In case
4 min read
Jan
18

The High Cost of Unbounded Loops: Denial of Service
Unbounded Loop Vulnerability:
An unbounded loop vulnerability is a type of security flaw that can occur in smart contracts when
4 min read
Jan
17

Securing Smart Contracts: The extcodesize Pitfall
A common method of checking EOA or a contract address, extcodesize function, has a vulnerability. Attackers can exploit it during contract construction, allowing them to bypass check and attack smart contracts. Be aware of this pitfall and take extra measures to secure them.
3 min read
Jan
16

Cheatsheet - 15 Methods to Bypass 2FA Mechanism
In 2-Factor Authentication, when a user enters his password with the intention to log in the web application sends a
4 min read
Jan
08

How I fuzz and hack APIs?
Hello Hackers,
In this post, I will explain how I fuzz APIs for bugs. This blog is more about how
5 min read
Dec
25

How I Pwned 10 Admin Panels and got rewarded 8000$+?
Hello Hackers,
I am Inderjeet Singh aka encodedguy. Today, I will share one of my recent findings where I pwned
4 min read
Dec
23

Exploring the Technical Design of ChatGPT: "A Powerful Chatbot Language Model"
Introduction to OpenAI:
OpenAI is a research organization that focuses on developing and promoting friendly artificial intelligence. It was founded
3 min read
Dec
21

How Race Condition helped me break Business Logic of the application
$whoami
I am Gautam Nangia, a 20yr old Cyber Security Enthusiast that loves to hack and explore the field of
3 min read