HungrysoulEngineering Multi-tenancy, Multi-region at Strobes“Building a cybersecurity or fintech product is so much fun,” said no one ever, due to the chaos of data security, localization, and…Feb 19Feb 19
HungrysoulThe story of misleading thousands of Indians by claiming Arogya Setu has been hackedOn May 5th, 2020, a twitter user with the handle @fs0c131y starts creating a hype about “hacking” into the Arogya Setu app (the contact…May 9, 2020May 9, 2020
HungrysoulWriting a scanner to find reflected XSS vulnerabilities — Part 2In my previous blog post, we have learned how to write a request parser and then an initial prober. In this post, we will be writing the…Apr 27, 2020Apr 27, 2020
HungrysoulWriting a scanner to find reflected XSS vulnerabilities — Part 1In 2016, I worked on a web application scanner project that works very similar to burp suite, it proxies the HTTP(s) requests from a…Apr 26, 2020Apr 26, 2020
HungrysoulPrioritizing vulnerabilities the right wayVulnerability management is an age-old problem. It is a mammoth of a challenge to find and fix vulnerabilities faster. Large organizations…Apr 26, 2020Apr 26, 2020
HungrysoulAutomating Inside Sales Part 1 - Find any email addressThis will be a series of blog posts in which I will explain how we automated our inside sales and how you can implement the same in your…May 13, 20181May 13, 20181
HungrysoulMethodology — Secure Code Review for Node.JS Express AppsThis week I had nothing lot to do, so thought why not select any interesting project and sit on it. Luckily there was one such project in…May 5, 20182May 5, 20182
HungrysoulHello Medium!Yes! Yes! It’s happening, after all these years I have finally decided to start writing blogs. TBH, there are so many things that are…May 3, 2018May 3, 2018