Starting out with Malware DevelopmentCreating a piece of Malware always sounds fascinating to me. So recently I actually wrote a dropper in C for an unrelated project and then…Jun 3Jun 3
Weak [TryHackMe] WalkthroughI recently developed a THM Room for a CTF event at my college and here is the Walkthrough !!Apr 1, 2023Apr 1, 2023
Published inSystem WeaknessHow to prevent misuse of single user mode in grub based systemsFollowing up with my last blog, I wanted to look out for some way to protect my GRUB from being edited by anyone who wants to physically…Nov 20, 2022Nov 20, 2022
Published inSystem WeaknessHow to reset the root password of any GRUB-based Linux system.So this hit me hard when Nitesh Singh aka “Technical Navigator” visited our campus and gave a small demo about this. So I researched a…Nov 1, 2022Nov 1, 2022
Using Virtual Box with Fedora 36So I have always only used the most simple to use distros and all, so when I made a new setup I thought lets go with Fedora, which often…Jul 21, 2022Jul 21, 2022
Published inSystem WeaknessHow to setup an Android Security Testing LabSo in this blog I will setup a lab to test android applications. Basically Mobile APIs and .apks.Jul 1, 2022Jul 1, 2022
Published inSystem WeaknessHow to catch a Reverse shell over the InternetIn this blog, I talk about exposing one local port to the internet and using it to catch reverse shells like we would do in any local…Jun 19, 2022Jun 19, 2022
Dockerising a Flask WebappSo, I recently dabbled with docker a bit , and its really fun.Jun 18, 2022Jun 18, 2022