Published inInfoSec Write-upsUnderstanding Inconsistencies in IP Address Classification Across Programming LanguagesAs a security researcher, I’ve been analyzing IP address classification behaviors across various programming languages. Recently, I noticed…Sep 29Sep 29
Supply Chain Security: Hacking Nimble PackagesIn the world of software development, package managers are critical for managing dependencies and streamlining the development process…Aug 4Aug 4
Published inInfoSec Write-upsExposing Hidden Dangers: The Essential Guide to Secret Scanning in Package RepositoriesIn the ever-shifting realm of cybersecurity, staying one step ahead of potential threats is a non-negotiable mission. Package repositories…Jun 5Jun 5
Published inInfoSec Write-upsDecoding the Enigma: A Journey into Minesweeper’s Reverse EngineeringHow to Reverse Engineer MineSweeperAug 20, 2023Aug 20, 2023
Published inInfoSec Write-upsGame Hacking 101: Unleashing the Power of Memory ManipulationIntroductionJul 8, 2023Jul 8, 2023
Published inDev GeniusGame Hacking 101: Unleashing the Power of Memory ManipulationIntroductionJul 8, 2023Jul 8, 2023
Published inDev GeniusIdentifying Coin Scammers with Wallet-TrackerIntroductionJan 16, 2023Jan 16, 2023
Published inInfoSec Write-upsIdentifying Coin Scammers with Wallet-TrackerIntroductionJan 15, 20232Jan 15, 20232
Published inInfoSec Write-upsHacking Instagram ScammersHacking Instagram Scammers and Takeover Admin PanelApr 11, 20224Apr 11, 20224