Blog

Asking AI agents to do (not so) malicious stuff - Presentation

Moltbook can be a vector for prompt injection attacks. In this presentation, I tried to prove my hypothesis with findings I had from past week's data collection.

Read more

JS Recon Presentation

After 2 months of development, I gave my first presentation at RITSEC, which is the cybersecurity club at Rochester Institute of Technology.

Read more

Wardrive of 250 KM with Raspberry Pi and a Phone

I travelled for more than 1000 KMs and started my wardrive gear on 1/4th of it, leading to a wardrive of 250 KM

Read more

The Security Puzzle of GraphQL – 1

GraphQL is getting widely adopted for APIs, but with features, it also brings home vulnerabilities.

Read more

How did I land my first cybersecurity internship while being a high-school student?

I got my first cybersecurity internship at a high-school, without a degree. Here's how!

Read more

Subdomains Wordlist. How it is made?

Wordlists are the thing you require for subdomain bruteforcing. In this article, I discussed how I generated one

Read more

Automated Monitoring + Time = Bug, the bug on HackerOne Target (8×8)

In this blog, I discussed how I found a bug in HackerOne target through automated monitoring

Read more

Wardrive without a GPS module and WiFi adapter that supports monitor mode, but a Raspberry Pi

I did wardrive,,,, without a proper wardrive gear, but with a raspberry pi, and my centuries old mobile phone.

Read more

Monitoring your targets for bug bounties

Writing scripts to monitor bug bounty targets, for fun and profit

Read more

Hello, World!

Read more