PinnedTanishq Sachin ShahMastering Subdomain TakeoversSteal a website? Not quite, but close!May 111May 111
Tanishq Sachin ShahExploiting LLM (Large Language Model)As large language models (LLMs) like ChatGPT, Google Bard (now Gemini), and others gain prominence, chat options like “Live Chat” or “Chat…Mar 14Mar 14
Tanishq Sachin ShahForget Blockers, Own Your Freedom: SquareXWe can’t monitor every link, and I even highlighted a few techniques to be safe in my last blog, but this isn’t practical for everyone..Jan 121Jan 121
Tanishq Sachin ShahIDOR — Insecure Direct Object ReferenceTHIS IS EVERYWHERE!!💀☠️Sep 11, 2023Sep 11, 2023
Tanishq Sachin ShahBypassing Multi-factor Authentication (MFA) — Part 1So, multi-factor authentication, also known as MFA, is like this super cool security thing that goes beyond just using a username and…Jul 11, 2023Jul 11, 2023
Tanishq Sachin ShahThe Art of Being AnonymousIn the context of the internet, anonymity refers to situations in which a person’s identity is unknown, untraceable, and unreachable. And…Jul 11, 2023Jul 11, 2023
Tanishq Sachin ShahBlockchain: The Unhackable Savior of Cyberspace?Let’s dive into the realm of groundbreaking technology that’s reshaping the way we secure our digital lives. Blockchain, initially designed…Jul 11, 2023Jul 11, 2023
Tanishq Sachin ShahBurp Suite“Burp Suite: the hacker’s tool for making websites say ‘excuse me’.”Jul 11, 2023Jul 11, 2023