About:

Vikrant Singh Chauhan, aka 0xcrypto, is a security software developer with interests in application security and programming languages.

Website:

Specializations:

Interests:

Application Security Cloud Security Endpoint Security Linux Darwin Systems Programming Languages Compilers

Outgoing Links:

Schneier on Security
Subscribe to RSS:
The article discusses how AI wrappers can be tricked into generating system prompts, exposing the limits put in place by developers. It provides various methods to get the system prompts and highlights the potential risks of AI mo...
The text discusses the curse of blindness and the curse of knowledge, which are common problems faced by people trying to do something that requires intellect. The curse of blindness occurs when a person lacks knowledge and feels ...
The text discusses a vulnerability in the Harvest app that allows for the stealing of access tokens through an open redirect in the OAuth application. It provides a proof of concept and details the process of reporting and fixing ...
The article provides a list of good and bad learning resources for computers and programming. It recommends official documentations, reputable boot camps and MOOCs, blogs by professionals, books, link aggregator websites, and repu...
The text is about the Mutant Programming Language, which was presented at Nullcon Goa 2022. The language is designed to encrypt code by mutating byte code in runtime. The author submitted the language as a challenge entry for CTF^...
The article introduces Default RED, formerly known as Hackberry, as a company focusing on cybersecurity products and vulnerability research. The author shares the challenges faced with Hackberry and the new approach with Default R...
The text discusses the use of unit testing frameworks as a vulnerability scanner, highlighting the flexibility and benefits of using unit tests over traditional vulnerability scanners. It provides a detailed guide on how to use xU...
CraftCMS has a zero-day chain vulnerability that allows XSS to SSTI triggering RCE. The exploit chain consists of 3 vulnerabilities and 4 bugs, resulting in a monetary reward and 2 CVEs. The vulnerabilities have been fixed in vers...
The text discusses the concept of greybox testing, which involves accessing the source code to find vulnerabilities. It provides a step-by-step guide on how to get started with greybox testing, including choosing a target, finding...
The text discusses the burnout experienced by a security researcher who transitioned from being a backend developer to bug bounty hunting. It delves into the challenges of bug bounty hunting, the difference between bugs and vulner...
The text discusses the issue of IP address leakage in WordPress due to misconfiguration, which can bypass Web Application Firewalls like CloudFlare. It explains how the leakage occurs, the environment required for exploitation, an...