Mukund KediaNahamcon CTF 2024 Crypto writeup — Magic RSA, Encryption ServerMagic RSA3 min read·May 27, 2024----
Mukund KediaReverse Engineering — Malware Analysis — 1Hashing can be used to identify a malicious software. Such software can be passed through a hashing program. The hash generated can be…2 min read·Mar 19, 2024----
Mukund KediaASP.NET securityIf we use Razor pages, then there is an option to use ‘@’. Using ‘@’ to display text on the screen would HTML encode some characters like…1 min read·Feb 19, 2024----
Mukund KediaObservations while learning Web app security(Will try to update it regularly)7 min read·Sep 2, 2021----