1.Insecure Direct Object Reference Vulnerability POC
2.Vertical Privilege Escalation via IDOR
3.Aadhar with a Security Perspective