
Asking AI agents to do (not so) malicious stuff - Presentation
Moltbook can be a vector for prompt injection attacks. In this presentation, I tried to prove my hypothesis with findings I had from past week's data collection.

Moltbook can be a vector for prompt injection attacks. In this presentation, I tried to prove my hypothesis with findings I had from past week's data collection.

After 2 months of development, I gave my first presentation at RITSEC, which is the cybersecurity club at Rochester Institute of Technology.

I travelled for more than 1000 KMs and started my wardrive gear on 1/4th of it, leading to a wardrive of 250 KM

GraphQL is getting widely adopted for APIs, but with features, it also brings home vulnerabilities.

I got my first cybersecurity internship at a high-school, without a degree. Here's how!

Wordlists are the thing you require for subdomain bruteforcing. In this article, I discussed how I generated one

In this blog, I discussed how I found a bug in HackerOne target through automated monitoring

I did wardrive,,,, without a proper wardrive gear, but with a raspberry pi, and my centuries old mobile phone.

Writing scripts to monitor bug bounty targets, for fun and profit
