Research Log

Technical deep-dives into malware analysis, bug bounty write-ups, and zero-day research findings.

Bruteforce vs Permutations #BUGBOUNTY
May 27, 2023 8 min read

Bruteforce vs Permutations

Comparing subdomain bruteforce and permutation techniques using Regulator, DNSGen, and AlterX to find the most effective reconnaissance strategy.

Read Article
Basic recon to RCE III #BUGBOUNTY
Oct 18, 2022 7 min read

Basic recon to RCE III

Exploiting command injection through Ruby string interpolation in a Rails application to achieve RCE via DNS exfiltration.

Read Article
DNS Tools Comparison #BUGBOUNTY
Apr 26, 2022 7 min read

DNS Tools Comparison

Comparing Amass, DNSX, and PureDNS for DNS resolution accuracy and performance in bug bounty reconnaissance.

Read Article
Basic recon to RCE II #BUGBOUNTY
Mar 22, 2022 4 min read

Basic recon to RCE II

How trusting my instincts led to discovering a critical RCE that everyone else missed on a popular bug bounty program.

Read Article
Basic recon to RCE #BUGBOUNTY
May 2, 2021 3 min read

Basic recon to RCE

How I discovered my first RCE through basic reconnaissance and exploiting a known Java deserialization vulnerability in Adobe ColdFusion.

Read Article