💰 Midnight Bounty: How I Found a QA Portal Exposed to the Internet and Got $2,500 OvernightFrom late-night recon to a $2.5k payout in three hours — here’s how I stumbled upon a full admin portal open to the internet, and what…3d ago3d ago
🩸 Vamp Byte #3 — SPF, DKIM & DMARC: The Trio That Guards Your InboxYour inbox is under attack — not from vampires, but from spoofed emails pretending to be your trusted domain. Just like a vampire needs an…6d ago6d ago
Bridging the Gap: Stored Procedures-Advantage and Limitations in Context of SQL InjectionStored procedures can reduce SQL Injection risk — but only when used correctly. Learn the real benefits, the common pitfalls, and quick…6d ago6d ago
Bridging the Gap: SQL Injection — From Payloads to Prepared StatementsFrom a pentester’s payload to the developer’s patch — a dual-perspective guide to find, understand, and fix SQL Injection.Oct 29Oct 29
Fixing the Medium Access Issue in India: Simple Solutions That WorkOver the past few days, many users in India have reported problems accessing articles on Medium.com. Whether it’s endless loading, login…Oct 27Oct 27
🔐 Day 8 of MCP Security: Secrets in Context — Managing Secrets and Tokens in MCP SystemsWelcome back to codewithvamp’s 10 Days of MCP Security series. So far, we’ve discussed access control, context drift, policy enforcement…Sep 5Sep 5
🦇 Vamp Byte #1 — What is a Favicon Hash in OSINT?If you’ve ever opened a website, you’ve probably noticed the tiny icon that appears in your browser tab. A favicon (short for favorite…Aug 17Aug 17
Earned $$$$ by Tricking an AI Chatbot Into Giving Me SecretsAI-powered chatbots are everywhere today — handling support, processing transactions, even giving account information. But with…Aug 16A response icon2Aug 16A response icon2