PinnedExploring the World of Cybersecurity: A Collection of My Blog Posts, Researches, and Open-Source…IntroductionJul 23, 2023Jul 23, 2023
AI Code Security: A Challenge To Be Solved By… AIThis one is going to cover the content of the talk I presented in DeepSec Austria, Vienna 2024 about “AI Code Security: A Challenge to be…Dec 2, 2024Dec 2, 2024
ChatGPT Advises on Using Insecure URLsI requested ChatGPT to generate a Dockerfile script for installing a specific version of the Glibc package (version 2.39), which required…May 22, 2024May 22, 2024
Part 6 — My Talk “The Evolution Of Exploiting Memory Vulnerabilities In Linux”This one is going to cover the content of the talk I presented in OWASP Washington DC 2023 and DeepSec Austria, Vienna 2023 about “The…Nov 19, 20231Nov 19, 20231
Part 4 — The Evolution of Attack TechniquesThis section will delve into the evolution of exploit creation. Now that we’re familiar with the security mechanisms acting as barriers…Nov 16, 2023Nov 16, 2023
Part 3 — Kernel Level Security MechanismsThis part of the research is focussed on explaining the evolution of the development of Security Mechanisms in Linux. I created a timeline…Nov 15, 2023Nov 15, 2023
Part 2 — Compiler Level Security Mechanisms (GCC)This section covers information about security mechanisms at the compiler level. It provides detailed information about each security…Nov 14, 2023Nov 14, 2023
Dissecting and Exploiting CVE-2021–41773 and CVE-2021–42013In this comprehensive blog post, we will explore two common vulnerabilities in Apache HTTPD: CVE-2021–41773 and CVE-2021–42013. If you’re…Aug 2, 2023Aug 2, 2023