Published inBug Bounty HuntingSecure System Design for scalable Token RevocationA major fintech company’s payment application, processing over 1 million transactions daily, recently experienced a security incident where…Nov 28, 20241Nov 28, 20241
Published inBug Bounty HuntingEasiest fix to file Path traversal attacks: Secure coding methodologyAs a Product security engineer, you are tasked with this situation: “What would you suggest the Junior Backend Developer in your company…Nov 22, 2024Nov 22, 2024
Published inBug Bounty HuntingFinding Security Design Flaw in a FAANG to later be ghosted by Recruiter: A funny TaleThis post is regarding a funny experience I had with one of the FAANG companies during security engineer interview.Nov 14, 2024Nov 14, 2024
Published inBug Bounty HuntingRegex For Noobs and Security EngineersRegex is one of the most useful input matching feature used for various usages. For example, regex is used for filtering for…Nov 10, 2024Nov 10, 2024
Published inBug Bounty HuntingExplaining Singly Linked List data structure for NoobsLet us design and implement singly linked list in python. This post would make it very (yyy) easy for anyone to understand how to implement…Oct 29, 2024Oct 29, 2024
Published inBug Bounty HuntingHow I tricked ChatGPT to act as a “person interviewing for CTO position” and write real malware…Prompt injection TechniqueOct 10, 20242Oct 10, 20242
Published inBug Bounty HuntingSecurity Code Review of Race Condition bug in PythonRace condition bugs are some of the most overlooked issues during software development. One of the best exploits using this is to gain…Aug 20, 2024Aug 20, 2024
Published inBug Bounty HuntingNetlas Recon Automation with Nuclei: NeuroNetlas is a very new tool providing variety of services like IP WHOIS search, DNS search, attack surface discovery, Certificate Search…Nov 8, 20231Nov 8, 20231
Published inBug Bounty HuntingAutomating Port Knocking with Knockd Shellscript wrapperIn today’s interconnected world, ensuring the security of your servers and networks is paramount. One often-overlooked security measure is…Oct 30, 2023Oct 30, 2023
Published inBug Bounty HuntingAndroid Game HackingClient and server side gamesOct 16, 2023Oct 16, 2023