Published inInfoSec Write-upsProcess Hypnosis: Debugger assisted control flow hijackHey reader!Mar 30, 2024Mar 30, 2024
Published inInfoSec Write-upsZephyr Prolab Extravaganza:Navigating the AD Lab with Laughter and Learning!Jan 17, 20242Jan 17, 20242
Published inInfoSec Write-upsAllSafe (Intentionally Vulnerable Android Application)- Part 2Hey fella!May 31, 2023May 31, 2023
Published inInfoSec Write-upsAllSafe (Intentionally Vulnerable Android Application)- Part 1Hey fella!!!!May 4, 2023May 4, 2023
Published inInfoSec Write-upsHTML Injection inside Email body- The First BUG I hunted down in a Bug Bounty Platform!Hola Amigo!!Sep 26, 20221Sep 26, 20221
My PNPT(Practical Network Penetration Tester) experience and reviewHey buddy!Mar 28, 20221Mar 28, 20221
Published inInfoSec Write-upsTomGhostHello there!!This is not gonna be a regular write-up of the machine , instead I would like to do this as a Penetration-Test report with…Oct 16, 2021Oct 16, 2021
Published inInfoSec Write-upsCAP WriteupCAP is an easy Linux machine which provides most of the information to solve in its name itself.Oct 6, 2021Oct 6, 2021