My First Post
IntroductionAn introduction to my blogging journey and what to expect from this space.
Security insights, technical deep dives, and learning journeys from the frontlines of cybersecurity
An introduction to my blogging journey and what to expect from this space.
Exploring current trends and developments in the technology landscape.
Exploring the dual nature of APIs - from seamless data exchange to potential weaponization in cybersecurity. A deep dive into Windows API, memory manipulation, and API hooking techniques.
Practical OSINT techniques for penetration testing across multiple domains - from web reconnaissance to cloud identity attacks and mobile app analysis.
Redacted full-depth lab report: SSRF vulnerability in EC2-hosted web app leading to IAM role credential disclosure and cloud identity compromise.
Deep dive into fileless shellcode loader evasion techniques - complete technical breakdown with obfuscation, API hashing, and syscall injection.
APISEC UNI course review and VAPI hacking walkthrough - conquering OWASP Top 10 API vulnerabilities from IDOR to SQL injection.
Two-part series: SQL injection, privilege escalation, and 15 other vulnerabilities that would let attackers own a banking operation.