Open in app

Sign in

Medium Logo
Write

Sign in

Padsala Tushal
Padsala Tushal

93 followers

Home

About

My Approach and Solutions: Navigating the eBhadra CTF Challenge

It’s been a while, but I’m back with another write-up. This time, I’m sharing my approach and solutions to the eBhadra CTF Challenge…

Feb 19, 2024
My Approach and Solutions: Navigating the eBhadra CTF Challenge
My Approach and Solutions: Navigating the eBhadra CTF Challenge
Feb 19, 2024

From Disclosure to High Severity: Leveraging Dyte API Key for Maximum Impact

Introduction:

Jan 2, 2024
From Disclosure to High Severity: Leveraging Dyte API Key for Maximum Impact
From Disclosure to High Severity: Leveraging Dyte API Key for Maximum Impact
Jan 2, 2024

Out-of-Scope, Not Out-of-Impact: Unveiling Significant Sensitive Information Disclosure

As a bug bounty hunter, navigating the complexities of subdomain vulnerabilities often leads to intriguing discoveries. One such…

Dec 23, 2023
Out-of-Scope, Not Out-of-Impact: Unveiling Significant Sensitive Information Disclosure
Out-of-Scope, Not Out-of-Impact: Unveiling Significant Sensitive Information Disclosure
Dec 23, 2023

Subdomain Takeover in Azure Trafficmanager for Fun & Profit

Introduction:

Dec 15, 2023
2
Subdomain Takeover in Azure Trafficmanager for Fun & Profit
Subdomain Takeover in Azure Trafficmanager for Fun & Profit
Dec 15, 2023
2

TryHackMe: Basic Pentesting — Write-Up

Hi,

Oct 15, 2021
TryHackMe: Basic Pentesting — Write-Up
TryHackMe: Basic Pentesting — Write-Up
Oct 15, 2021
Padsala Tushal

Padsala Tushal

93 followers

Bug Bounty | DevOps | Open Source

Following
  • AJAK Cyber Academy

    AJAK Cyber Academy

  • Kashish Charaya

    Kashish Charaya

  • Hasirhamdan

    Hasirhamdan

  • Jeel Makwana

    Jeel Makwana

  • Akash Falaskar

    Akash Falaskar

See all (24)

Help

Status

About

Careers

Press

Blog

Privacy

Rules

Terms

Text to speech