Illusion of Randomness & Exploiting RNGsEntropy, a more scientific term for what we call “randomness” is the measure of uncertainty or disorder. But the question is, how do we…Jul 23, 20191Jul 23, 20191
Finding vulnerabilities in Source CodeAlthough I am not a professional source code auditor but I am a programmer as well as a security researcher. The article is based on my…Jun 29, 20191Jun 29, 20191
Learn to code in less than a weekProgramming is an amazing skill to have and I believe it’s essential if you want to be good at information security. With the magic of…Apr 28, 201910Apr 28, 201910
How I found 5 ReDOS Vulnerabilities in Mod Security CRSThis write-up assumes that the reader has intermediate (or higher) knowledge of regular expressions. If you are not very familiar with…Apr 22, 20191Apr 22, 20191
Exploiting Regular ExpressionsA regular expression (or regex) is basically a search pattern. For example, the expression [cb]atwill match both cat and bat. This isn’t a…Feb 23, 20194Feb 23, 20194
Unblurring Images for OSINT and more — Part 1During intelligence operations, we often come across images that may contain important information but they are too blurred, noisy or just…Jan 7, 20194Jan 7, 20194
Backdooring Websites with just 35 bytesNinjas need to be stealthy but trading off usability for stealth is a bit expensive. We want our web shell to be able to do everything…Oct 6, 2018Oct 6, 2018
Cracking eAadhar password in 2 seconds with MathsThis article is already kind of lengthy so let’s get straight to the point.Jul 30, 201822Jul 30, 201822