Archive

Security

Security research notes, exploitation writeups, operational tooling, and investigation ideas.

Security

Co-authoring a Cyber-Security Book With IIT Kanpur

I had the opportunity to co-author a cyber-security book published by River Publishers in association with Indian Institute of Technology, Kanpur. …

Security

How to route entire traffic of iPhone and Macbook through Tor using Raspberry Pi

Introduction It should be trivial to understand by now that privacy and anonymity is an absolute must in the current age of everything being on the …

Security

Enumeration using nmap

Introduction The de-facto standard for the first step in enumerating the target. Let’s try to understand a few concepts. Port scanning TCP …

Security

Huntsman: A swiss army knife for offensive security

Huntsman A swiss army knife for offensive security. https://souvikhaldar.github.io/huntsman/ Inspiration The inspiration of this tool are primarily …

Security

Hacking my way into Hack The Box invitation

In order to join Hack The Box, one needs to capture the flag and the flag is the invitation code which will allow you to join them. This blog explains …