Published inInfoSec Write-upsUnderstanding Inconsistencies in IP Address Classification Across Programming LanguagesAs a security researcher, I’ve been analyzing IP address classification behaviors across various programming languages. Recently, I noticed…Sep 29, 202420Sep 29, 202420
Supply Chain Security: Hacking Nimble PackagesIn the world of software development, package managers are critical for managing dependencies and streamlining the development process…Aug 4, 20242Aug 4, 20242
Published inInfoSec Write-upsExposing Hidden Dangers: The Essential Guide to Secret Scanning in Package RepositoriesIn the ever-shifting realm of cybersecurity, staying one step ahead of potential threats is a non-negotiable mission. Package repositories…Jun 5, 20247Jun 5, 20247
Published inInfoSec Write-upsDecoding the Enigma: A Journey into Minesweeper’s Reverse EngineeringHow to Reverse Engineer MineSweeperAug 20, 202312Aug 20, 202312
Published inInfoSec Write-upsGame Hacking 101: Unleashing the Power of Memory ManipulationIntroductionJul 8, 202391Jul 8, 202391
Published inDev GeniusGame Hacking 101: Unleashing the Power of Memory ManipulationIntroductionJul 8, 202320Jul 8, 202320
Published inDev GeniusIdentifying Coin Scammers with Wallet-TrackerIntroductionJan 16, 202364Jan 16, 202364
Published inInfoSec Write-upsIdentifying Coin Scammers with Wallet-TrackerIntroductionJan 15, 2023562Jan 15, 2023562
Published inInfoSec Write-upsHow I hacked CTX and PHPass ModulesPrefaceMay 25, 20222242May 25, 20222242
Published inInfoSec Write-upsHacking Instagram ScammersHacking Instagram Scammers and Takeover Admin PanelApr 11, 20222574Apr 11, 20222574
Published inDev GeniusHacking Instagram ScammersHacking Instagram Scammers and Takeover Admin PanelApr 11, 20221Apr 11, 20221
Published inInfoSec Write-upsBypassing Door PasswordsInstead of a key, this type of lock system requires a numerical code to grant entry to a facility or property. The code is punched in by…Jan 7, 2022Jan 7, 2022