Archive
Security
Security research notes, exploitation writeups, operational tooling, and investigation ideas.
Co-authoring a Cyber-Security Book With IIT Kanpur
I had the opportunity to co-author a cyber-security book published by River Publishers in association with Indian Institute of Technology, Kanpur. …
SecurityHow to route entire traffic of iPhone and Macbook through Tor using Raspberry Pi
Introduction It should be trivial to understand by now that privacy and anonymity is an absolute must in the current age of everything being on the …
SecurityEnumeration using nmap
Introduction The de-facto standard for the first step in enumerating the target. Let’s try to understand a few concepts. Port scanning TCP …
SecurityHuntsman: A swiss army knife for offensive security
Huntsman A swiss army knife for offensive security. https://souvikhaldar.github.io/huntsman/ Inspiration The inspiration of this tool are primarily …
SecurityHacking my way into Hack The Box invitation
In order to join Hack The Box, one needs to capture the flag and the flag is the invitation code which will allow you to join them. This blog explains …