PinnedAlok kumarSmuggling Files via HTML — Bypassing Web proxies & Spam FiltersUnderstanding HTML Smuggling — MITRE ATT&CK Tactic: Defense EvasionJul 4, 2023Jul 4, 2023
Alok kumarERC-20 Tokens Explained: The Standard Behind Ethereum’s Versatile TokensIn the world of blockchain technology and cryptocurrencies, ERC-20 tokens have become a fundamental component of the Ethereum ecosystem…Aug 20Aug 20
Alok kumarUnderstanding Layers of Blockchain TechnologyBlockchain technology is a decentralized digital ledger that records transactions across numerous computers, ensuring data integrityAug 10Aug 10
Alok kumarUnderstanding Smart Contracts: The Risks & Why Security is Required.Smart contracts, These self-executing contracts automate transactions and agreements without needing middlemen. While they offer great…Jul 29Jul 29
Alok kumarAdversary Simulation or Emulation! What should we go for?Terms like Adversary Simulation and Emulation are on fire these days. But what is the difference and what should we go for?Oct 9, 20231Oct 9, 20231
Alok kumarOwning a machine using xp_cmdshell via SQL Injection — Manual ApproachWhat is xp_cmdshell?Jun 17, 2023Jun 17, 2023
Alok kumarWhy verifying docker images is necessary? — Backdoring Docker Images.Exploring Docker Image TrustMay 20, 2023May 20, 2023
Alok kumarContainers, Securing Containers — Aren’t containers Safe?What are Cotainers?Nov 2, 2022Nov 2, 2022
Alok kumarHow to extract ipa from Jailbroken iOS deviceOkay, This is another how-to blog.Sep 16, 2022Sep 16, 2022