Published inThe PythoneersMastering Python’s Magic Methods: Build a Shodan Search ToolPython has certain ‘Special Methods’ that are called upon implicitly when performing specific operations on an object. We explore that…Jan 6Jan 6
Published inThe PythoneersHTTP Requests using Python — A Reference ArticleMaking HTTP requests is an essential skill for penetration testers, hackers, security researchers and developers. Web exploit development…Dec 3, 2024Dec 3, 2024
Published inInfoSec Write-upsSubdomain Enumeration — Developing the Attack SurfaceSubdomain Enumeration is a key step that Hackers (or malicious actors) perform in order to get a better view of the target’s…Apr 18, 20243Apr 18, 20243
Published inInfoSec Write-upsBreaking RSA Algorithm — Fermat’s SurpriseRecently I was doing a CTF challenge wherein the objective was to compromise the integrity of the RSA algorithm. Central to the challenge…Feb 29, 2024Feb 29, 2024
Published inInfoSec Write-upsScripting a Time based blind SQL InjectionBackgroundAug 15, 20231Aug 15, 20231
Published inInfoSec Write-upsPrototype Pollution — A Deeper InspectionThis article aims at understanding some of the basic & intermediate concepts around Prototype Pollution in JavaScript and how it can be…Aug 3, 20231Aug 3, 20231
Empline Walkthrough (THM) — Easy Box with OSCP flavourI recently completed a box on TryHackMe called Empline which I thought was a good box if you are preparing for exams like OSCP. It had one…Mar 11, 2023Mar 11, 2023
Hacker View — Online PDF GeneratorsIn this article, we will try to understand some of the typical security concerns in online PDF generators that convert Markdown text or…Feb 12, 20231Feb 12, 20231
Cult of Pickles — HTB ChallengeRecently I came across a very interesting challenge on HackTheBox relating to Pickling Vulnerabilities in Python. It was rated as “Easy”…Feb 12, 2023Feb 12, 2023