Y
Security Researcher
1y 9mos
Yogosha, Dec 23' - Present
@theteatoast
Anindya Roy
@theteatoast
I just enjoy hacking and gaming.
I just enjoy hacking and gaming.
Security Researcher, Yogosha
Kolkata, India
2
projects
2
0
prizes
0
3
hackathons
3
0
Hackathons org.
0
73
contributions in the last year
Oct
S
M
T
W
T
F
S
Sep
1
stars earned
29
repositories
2
followers
Y
1 year 9 months
Dec 23' - Present
1.Ranked in the top 100 researchers on Yogosha for consistent high performance and contributions.
2.Identified critical vulnerabilities and enhanced security in private and public programs.
Yogosha Profile
Y
S
Y
1y 9mos
Yogosha, Dec 23' - Present
S
1y 0mos
Security Lit, Jul 24' - Aug 25'
Blockmorph: Your Bridge to Web3 Blockmorph simplifies the complex world of Web3, making it accessible to both individuals and businesses. By providing a user-friendly interface and automation tools, Blockmorph helps users seamlessly transition from Web2 to Web3. Key Benefits Ease of Use: With its intuitive interface and guided tutorials, Blockmorph makes it easy for anyone to learn and implement Web3 technologies. Time and Cost Efficiency: By automating many of the complex tasks involved in Web3 development, Blockmorph helps users save time and money. Security: Blockmorph ensures the security of your Web3 projects through automated security audits and best practices. How Blockmorph Works Input Your Web2 Site: Simply enter the URL of your existing Web2 website. Explore Web3 Features: Blockmorph will suggest ways to enhance your website with Web3 elements like smart contracts and decentralized applications. Create and Deploy: Use Blockmorph's intuitive editor to create and deploy smart contracts with just a few clicks. Why Choose Blockmorph? Comprehensive Platform: Blockmorph offers a complete solution for Web3 development, including tools for creating, deploying, and managing smart contracts. Community Support: Benefit from a supportive community of developers and users who can help you with any questions or challenges. Continuous Improvement: Blockmorph is constantly evolving to stay ahead of the latest trends in Web3 and provide users with the best possible experience. Ready to embark on your Web3 journey? Start exploring Blockmorph today and discover the power of decentralized technologies.
The Problem It Solves Modern development pipelines lack a seamless way to: >Store codebases securely on-chain to ensure immutability and transparency. >Audit and validate smart contracts collaboratively and efficiently during the CI/CD process. >Streamline deployment of smart contracts to EVM-compatible chains with built-in safety checks. How It Helps >Secure On-Chain Storage: Safeguard your codebase or files with decentralized storage, ensuring transparency and tamper-proof history. >Automated Audits: Enable multiple agents to audit smart contracts in your CI/CD pipeline, reaching a consensus before approval. >Safe & Hassle-Free Deployment: Simplify the process of deploying validated contracts to EVM chains with just a click. This tool enhances security, reliability, and efficiency for developers, making Web3 integration in DevOps workflows easier than ever.
medium.com
While filling out a long vendor registration form on a private target, I left my session idle for about 25 minutes. When I came back and clicked “Next” the page loaded another user’s full registration details, including company PII, bank account, SWIFT, and IBAN. Reloading the page cleared everything. I reproduced the issue twice and found that it occurred right after the session expired. The root cause was likely a session or caching flaw in an ASP.NET 4.0.30319 application. The team accepted the report...
medium.com
Hey folks 👋, back with another bug story. This one’s about some old-school static analysis mixed with a bit of Google-fu. The end result? I stumbled on hardcoded credentials inside an Android app, figured out where they worked, and ended up accessing sensitive data in a partner portal. They patched it fast, and I grabbed a nice bounty. Here’s the play-by-play. The Discovery While poking at the Android App, I decided to do a little manual static analysis. So I grabbed the APK, ran: apktool d app.apk Then...
medium.com
Hey folks, as a bug hunter, I stumbled on this cool IDOR vuln on a private target. It let me peek at other users’ personal info without permission. Reported it through YesWeHack, got fixed, and scored $1,000. Here’s the quick story. What’s IDOR Anyway? IDOR occurs when an application exposes direct references to objects, such as IDs in URLs, without proper authorization. In this case, it disclosed names, emails, phone numbers, addresses, account numbers, and documents like passports and bank statements. ...