Illusion of Randomness & Exploiting RNGsEntropy, a more scientific term for what we call “randomness” is the measure of uncertainty or disorder. But the question is, how do we…Jul 23, 2019A response icon1Jul 23, 2019A response icon1
Deblurring images for OSINT — Part 2Let’s reverse Pixelize blur.Jul 12, 2019A response icon1Jul 12, 2019A response icon1
Finding vulnerabilities in Source CodeAlthough I am not a professional source code auditor but I am a programmer as well as a security researcher. The article is based on my…Jun 29, 2019A response icon1Jun 29, 2019A response icon1
Learn to code in less than a weekProgramming is an amazing skill to have and I believe it’s essential if you want to be good at information security. With the magic of…Apr 28, 2019A response icon10Apr 28, 2019A response icon10
How I found 5 ReDOS Vulnerabilities in Mod Security CRSThis write-up assumes that the reader has intermediate (or higher) knowledge of regular expressions. If you are not very familiar with…Apr 22, 2019A response icon1Apr 22, 2019A response icon1
Exploiting Regular ExpressionsA regular expression (or regex) is basically a search pattern. For example, the expression [cb]atwill match both cat and bat. This isn’t a…Feb 23, 2019A response icon4Feb 23, 2019A response icon4
Unblurring Images for OSINT and more — Part 1During intelligence operations, we often come across images that may contain important information but they are too blurred, noisy or just…Jan 7, 2019A response icon4Jan 7, 2019A response icon4
Backdooring Websites with just 35 bytesNinjas need to be stealthy but trading off usability for stealth is a bit expensive. We want our web shell to be able to do everything…Oct 6, 2018Oct 6, 2018
Cracking eAadhar password in 2 seconds with MathsThis article is already kind of lengthy so let’s get straight to the point.Jul 30, 2018A response icon22Jul 30, 2018A response icon22