0xAb1d {Connecting}...
Abid Ahmad

❯ Ethical Hacker_

❯ Cyber Security Researcher_

❯ Penetration Tester_

Abid Ahmad

❯ Ethical Hacker_

❯ Cyber Security Researcher_

❯ Penetration Tester_

Blogs

All Blogs

November 21, 2024 Critical Security Findings at the University of Cambridge: A Methodology for Detecting Exposed Credentials

How I discovered two critical vulnerabilities that exposed sensitive credentials and led to unauthorized access. b-ismi-llāhi r-raḥmāni r-raḥīmi — In…

November 20, 2024 Hacking Real-world AI Systems: The Art of Prompt Injection Attacks — Part 1

Ready to Hack AI models? Learn How to Hack AI Systems and Access Sensitive Data. Discover How Prompt Injection Can…

November 19, 2024 How I was able to find multiple vulnerabilities of a Symfony Web Framework web application

Found high severity vulnerability in 5 minutes just from reconnaissance. Found multiple vulnerabilities on a web application that used the…

November 6, 2024 JSLeakRecon: The Ultimate Tool for Detecting Potential Leaks in JavaScript Files

Quickly Identify Hardcoded Credentials, API keys, Access Tokens, Secret keys, and Critical security issues in JavaScript Files b-ismi-llāhi r-raḥmāni r-raḥīmi…

All Categories