Portfolio
Cross-Site Request Forgery: An Explanation with real-life Example Summary: CSRF, an OWASP Top Ten 2013 vulnerability is considered extinct by some. But not quite so! This article explains CSRF usin...
What’s on my .htaccess? Summary: This guide utilizes the .htaccess configuration on my own server to show you how to sort out some common security issues.
Prevent WordPress Username Enumeration Summary: Username enumeration can make it easier for hackers to compromise your WordPress website. This article explains how to prevent such attacks.
My InfoSec Journey Summary: The story of how I got my start in Cybersecurity, published in hopes of helping someone new in this field. Read about the steps I took, mistakes I made, and recommendati...
Passed the Certified Blockchain Security Professional™ examination and attained the certification for the same from Blockchain Council.
Released Vulnerability Assessment & Penetration Testing Toolkit 🧰 Details: • A toolkit aiming to help automate some of the initial tests done when starting VAPT on a target web application.