Published inInfoSec Write-upsProcess Hypnosis: Debugger assisted control flow hijackHey reader!Mar 30, 20246Mar 30, 20246
Published inInfoSec Write-upsZephyr Prolab Extravaganza:Navigating the AD Lab with Laughter and Learning!Jan 17, 2024212Jan 17, 2024212
Published inInfoSec Write-upsAllSafe (Intentionally Vulnerable Android Application)- Part 2Hey fella!May 31, 20236May 31, 20236
Published inInfoSec Write-upsAllSafe (Intentionally Vulnerable Android Application)- Part 1Hey fella!!!!May 4, 202364May 4, 202364
Published inInfoSec Write-upsHTML Injection inside Email body- The First BUG I hunted down in a Bug Bounty Platform!Hola Amigo!!Sep 26, 20221831Sep 26, 20221831
My PNPT(Practical Network Penetration Tester) experience and reviewHey buddy!Mar 28, 2022311Mar 28, 2022311
Published inInfoSec Write-upsTomGhostHello there!!This is not gonna be a regular write-up of the machine , instead I would like to do this as a Penetration-Test report with…Oct 16, 2021Oct 16, 2021
Published inInfoSec Write-upsCAP WriteupCAP is an easy Linux machine which provides most of the information to solve in its name itself.Oct 6, 2021Oct 6, 2021