Hi everyone! As promised, we will be conducting a free live webinar on server side request forgery on 29th June 2025 to celebrate 30k subscribers!!
This webinar will cover everything about ssrf from basics to advanced with practical demonstration & some PoCs as well
If you are interested then feel free to submit this form: https://forms.gle/2axTEKZpjTKcrVDa7
Once again, Thank you all for supporting the channel. Keep learning & Keep hacking!
- Faiyaz Ahmad
This webinar will cover everything about ssrf from basics to advanced with practical demonstration & some PoCs as well
If you are interested then feel free to submit this form: https://forms.gle/2axTEKZpjTKcrVDa7
Once again, Thank you all for supporting the channel. Keep learning & Keep hacking!
- Faiyaz Ahmad
❤28🔥7😁1
Hi everyone! For the next video, I am thinking of creating one on how to get your first job in cyber security as a fresher in 2025. What do you guys think?
Anonymous Poll
75%
Sure, that'll be great
25%
Nah, make videos on bug bounty, vulnerabilities etc
❤7
This media is not supported in your browser
VIEW IN TELEGRAM
Really glad to have you all in the event! Hope you all liked it & got to learn something new
👍10❤8🥰1
The webinar's recording is live on YouTube! Check it out here: https://www.youtube.com/watch?v=FwahyqRna5k
YouTube
SSRF Hacking Masterclass: Real Bypasses, PoCs & Hidden Techniques (30K Subscribers Special) | 2025
To celebrate hitting 30,000 subscribers, I hosted this special live webinar focused entirely on Server-Side Request Forgery (SSRF)—a vulnerability often underestimated, yet highly impactful when chained right.
In this recorded session, I cover:
Introduction…
In this recorded session, I cover:
Introduction…
🔥21❤🔥8❤6
Hi everyone, Next video will be released tomorrow! This one's really interesting and will help you to discover vulnerabilities in modern applications.. I've recently used this method & found 5 critical vulnerabilities impacting their whole applications
Till then keep learning & keep hacking ❤️
Till then keep learning & keep hacking ❤️
❤20👍3🔥3👏2
The new video is out! Check it here: https://www.youtube.com/watch?v=puwF4Kyk0E0
YouTube
Bug Bounty Hunters: The JWT Mistake You’re Probably Missing | Practical Demonstration | 2025
If you’re hunting bugs and not checking for this JWT misconfiguration… you might be leaving money on the table.
In this video, I walk you through a real-world scenario where a JWT token from one subdomain could be reused to access another — including the…
In this video, I walk you through a real-world scenario where a JWT token from one subdomain could be reused to access another — including the…
❤12👍3🔥3
Hi people, is it really true that nahamsec recently created a new video which is very similar to our recent jwt exploit vulnerability?
🔥11👍5
Hi everyone, New video will be coming tomorrow at 6pm IST! Stay tuned ❤️
❤9👏1
My Take on AI in Cybersecurity
I believe that for a long time, AI will act more like a helpful assistant to cybersecurity professionals rather than replacing them completely. Here’s why:
1. AI Creates New Challenges Too
As the founder of Infosys once said, when machines start solving certain problems, humans begin working on more complex ones. A good example of this is how AI itself led to a new type of vulnerability known as *prompt injection*.
2. AI-Led Bug Hunting Isn’t Entirely New
Many people are talking about XBow AI, which recently ranked #1 on HackerOne’s VDP leaderboard. While that’s impressive, it’s important to remember that many top bug bounty hunters have been using their own powerful automation systems for years. These tools work at scale and follow unique methods, so this kind of automation isn’t new in the bug bounty world.
3. AI Struggles with Complex Vulnerabilities
While AI is good at finding common issues like simple XSS or IDOR, it still finds it hard to detect more advanced bugs—like business logic flaws, tricky XSS bypasses, or chaining multiple vulnerabilities together.
4. AI Can Make Mistakes (Hallucination)
Sometimes AI gives answers that sound correct but are completely wrong. This is called hallucination, and in cybersecurity, such mistakes can be risky and misleading.
Conclusion:
AI is definitely becoming a useful tool in cybersecurity, helping with automation, speed, and scale. But it’s not perfect and still needs human oversight, creativity, and deep understanding. Instead of seeing AI as a replacement, we should treat it as a partner that boosts our capabilities while we focus on solving the bigger, more complex problems
I believe that for a long time, AI will act more like a helpful assistant to cybersecurity professionals rather than replacing them completely. Here’s why:
1. AI Creates New Challenges Too
As the founder of Infosys once said, when machines start solving certain problems, humans begin working on more complex ones. A good example of this is how AI itself led to a new type of vulnerability known as *prompt injection*.
2. AI-Led Bug Hunting Isn’t Entirely New
Many people are talking about XBow AI, which recently ranked #1 on HackerOne’s VDP leaderboard. While that’s impressive, it’s important to remember that many top bug bounty hunters have been using their own powerful automation systems for years. These tools work at scale and follow unique methods, so this kind of automation isn’t new in the bug bounty world.
3. AI Struggles with Complex Vulnerabilities
While AI is good at finding common issues like simple XSS or IDOR, it still finds it hard to detect more advanced bugs—like business logic flaws, tricky XSS bypasses, or chaining multiple vulnerabilities together.
4. AI Can Make Mistakes (Hallucination)
Sometimes AI gives answers that sound correct but are completely wrong. This is called hallucination, and in cybersecurity, such mistakes can be risky and misleading.
Conclusion:
AI is definitely becoming a useful tool in cybersecurity, helping with automation, speed, and scale. But it’s not perfect and still needs human oversight, creativity, and deep understanding. Instead of seeing AI as a replacement, we should treat it as a partner that boosts our capabilities while we focus on solving the bigger, more complex problems
🔥17❤4💯2
For example, Here's a little info on web development jobs. Many people were saying that these jobs will be replaced as AI is really good at doing it.However, just a Google search will show you that these jobs will get increased in the near future instead of decreasing.
Therefore, just chill, learn, treat ai as a tool and keep grinding!
Therefore, just chill, learn, treat ai as a tool and keep grinding!
💯14👀3
Hi everyone, the new video is out!
Check it here: https://www.youtube.com/watch?v=ua_ES1d0l1g
Check it here: https://www.youtube.com/watch?v=ua_ES1d0l1g
YouTube
This Vulnerability Lets You Overwrite Anything the Server Can Touch — Instantly | Bug Bounty | 2025
In this video, I demonstrate how a simple ZIP file upload can lead to something far more dangerous — arbitrary file overwrite on the server. This is the Zip Slip vulnerability, and it's more common than you'd think.
You’ll learn:
What Zip Slip is and how…
You’ll learn:
What Zip Slip is and how…
❤9👍5
Hi everyone! Check out my recent linkedin post where i was able to bypass cloudflare waf & got xss with a unique method on a real target
Link: https://www.linkedin.com/posts/faiyaz-ahmad-64457520b_ive-recently-bypassed-a-cloudflare-web-application-activity-7351124286058770433-dgvy?utm_source=share&utm_medium=member_desktop&rcm=ACoAADVMiFQBQBWOA7hoDcQSKy5oBb0cvy4PNXs
Link: https://www.linkedin.com/posts/faiyaz-ahmad-64457520b_ive-recently-bypassed-a-cloudflare-web-application-activity-7351124286058770433-dgvy?utm_source=share&utm_medium=member_desktop&rcm=ACoAADVMiFQBQBWOA7hoDcQSKy5oBb0cvy4PNXs
Linkedin
Bypassed Cloudflare WAF, stole cookies. Watch video. Learn more on my YouTube channel. | Faiyaz Ahmad posted on the topic | LinkedIn
I've recently bypassed a Cloudflare web application firewall & successfully stolen the cookies on a real application. Check this video to know how!!
Want to learn more on cyber security & bug bounty? If yes, then check out my YouTube channel where i've uploaded…
Want to learn more on cyber security & bug bounty? If yes, then check out my YouTube channel where i've uploaded…
❤10
For the past few months, I've interviewed over 70+ candidates and while most of them had fancy certificates like OSCP etc..None were able to answer practical questions at all...
Remember: While it is important to have a certificate, The most important thing is to have the necessary skills for the role you're applying for!
Remember: While it is important to have a certificate, The most important thing is to have the necessary skills for the role you're applying for!
🔥24❤5
Most beginners in cybersecurity skip recon.
But real progress begins when you start mastering it.
I just dropped a complete Udemy course: The Art of Web Reconnaissance.
It covers everything from basic to advanced recon techniques, and by the end, we find high/critical vulnerabilities on a real-world target—using only recon.
If you're into bug bounties or ethical hacking, this course will change the way you look at reconnaissance.
Grab it now with the maximum discount (valid only for the next 3 days):
https://www.udemy.com/course/the-art-of-web-reconnaissance-bug-bounty-ethical-hacking/?couponCode=D75401875F9E3CC55BB9
But real progress begins when you start mastering it.
I just dropped a complete Udemy course: The Art of Web Reconnaissance.
It covers everything from basic to advanced recon techniques, and by the end, we find high/critical vulnerabilities on a real-world target—using only recon.
If you're into bug bounties or ethical hacking, this course will change the way you look at reconnaissance.
Grab it now with the maximum discount (valid only for the next 3 days):
https://www.udemy.com/course/the-art-of-web-reconnaissance-bug-bounty-ethical-hacking/?couponCode=D75401875F9E3CC55BB9
❤14
Hi everyone, New video will be releasing tomorrow at 11am IST! This one is really interesting and to be honest, it is one of the advanced stuffs that will be uploaded on our channel. Stay tuned❤️
🔥12❤4