PinnedBuilding a Strong Foundation — How to Create and Maintain an Effective Application Security ProgramAs businesses increasingly rely on digital technologies and applications to support their operations and interact with customers, the need…Dec 15, 2022Dec 15, 2022
I lost 12lbs in 10 days on ZepBound: My Honest Review.How it all started. Here’s what you should know.Jun 8Jun 8
Published inGeeksWhoWriteCopyAsASerivce (CaaS) go from $0 to $10k/mo — GeeksWhoWriteYou heard that right! Introducing CopyAsASerivce (CaaS) from GeeksWhoWrite.May 9May 9
RCE due to Dependency Confusion — $5000 bounty!Hey everyone! I’m back with another cool write-up about a bug bounty report I submitted to a private program on HackerOne. Guess what? I…May 10, 20237May 10, 20237
Blind XSS via SMS Support Chat — $1100 Bug Bounty!Hello Hunters, This is a quick write-up on how my blind XSS payload executed within an internal support portal via an SMS support chat.Apr 3, 20232Apr 3, 20232
Can ChatGPT and OpenAI Replace Application Security Engineers — Pros and ConsAs the world becomes increasingly reliant on technology and the internet, the need for skilled application security engineers to protect…Dec 15, 2022Dec 15, 2022
10 Ways to Keep Your Developers Happy and Secure — A Guide for Application Security EngineersAs an application security engineer, your job is to ensure the security of your company’s software and systems. But in order to do that…Dec 15, 2022Dec 15, 2022
Sub-Domain Takeovers — How can companies better secure their assets? Part 1An Ethical Hacker’s PerspectiveDec 10, 2019Dec 10, 2019