PinnedJayvin GohelBypassed an Admin Panel Using SQL PayloadsIt’s been a while since I last wrote a blog post, but I’ve got something interesting to share today. I recently managed to bypass an admin…Sep 82Sep 82
Jayvin GohelFound a Reflected XSS 💻Hello, hackers! While exploring bug bounty hunting in my part-time, I found a critical bug in the targeted domain. One of these, a P3, will…Oct 19Oct 19
Jayvin GohelOne-Liners: Your Secret Weapon for Bug Bounty Part-1Hello folks!!! I hope you’re all doing well.Sep 9Sep 9
Jayvin GohelExploring ‘GF’ Tool For Bug Bounty Hunting :Simple Techniques for Identifying Vulnerabilitieshello folks,Sep 4Sep 4
Jayvin GohelDynamic Malware AnalysisIn this blog post, we delve into the dynamic/runtime analysis of malware, exploring the tools and setup required for the process.Apr 9Apr 9
Jayvin GohelRTL-SDR R820T2Unlocking Radio Waves: Receiving and Listening to Radio Frequencies with RTL-SDRApr 1Apr 1
Jayvin GohelCVEMapHi there! It’s th3m4rk5man again with something amazing for you. I will be going through the topics which are easy to find any CVE Using…Feb 22Feb 22