Dirty Cow Vulnerability: An AnalysisThis post was initially published on my blog, please go check it out.Jan 13, 20231121Jan 13, 20231121
HackerOne CTF: PostbookI recently published an article on a CTF writeup, an introduction to the HackerOne CTF. You can find that article here. Today I am…Jul 21, 20223891Jul 21, 20223891
I got my CEH Practical, but is it worth it?Short answer: For $550, no.Dec 10, 20211901Dec 10, 20211901
Automation with bash!Learn to use bash to automate tasks that you would otherwise repeat on a day to day basis.Mar 30, 202079Mar 30, 202079
Basic Pentesting: 2 WalkthroughThis is a boot2root VM and is a continuation of the Basic Pentesting series. This series is designed to help newcomers to penetration…Jul 26, 2019Jul 26, 2019
Basic Pentesting: 1 WalkthroughThis is a small boot2root VM I created for my university’s cyber security group. It contains multiple remote vulnerabilities and multiple…Jul 18, 2019Jul 18, 2019
Nullbyte01 Walkthrough: Mostly what I understoodI came across the Nullbyte(by ly0n) virtual machine on Vulnhub and decided it won’t hurt to try hacking the box as it was recommended for…Jul 2, 2019Jul 2, 2019
Published inFAUN — Developer Community 🐾Git hacks no one tells you aboutWe’ll be talking about git today, not github or gitlab.Mar 15, 2019Mar 15, 2019
Your goal is too bigYes. It is. It’s beyond your scope. You have to stay in your zone.Mar 8, 20191Mar 8, 20191
Python enthusiasts who inspired me in 2018.Wow, I can’t believe 2018 is over. I feel like the year just started yesterday and vanished into thin air.Dec 31, 2018Dec 31, 2018
Developer By Default : My StoryHow I started Coding and the road to becoming a Python Developer/Hacker.Sep 4, 2018Sep 4, 2018