Beyond Scripting: Using LLMs to Create Automated API Testing SuitesIn today’s rapidly evolving cybersecurity landscape, security researchers are discovering powerful new allies in Large Language Models…5d ago5d ago
Published inInfoSec Write-upsCreating a Code Obfuscation Program For CImagine you’re trying to sneak past a security guard. If you walk right up wearing a mask and carrying suspicious stuff, you’ll get caught…Feb 11Feb 11
Published inInfoSec Write-upsBrute Forcing Financial Apps With HackerOneAbout a month ago, I identified my first vulnerability — a SQL injection in a financial application. That discovery marked the beginning…Feb 51Feb 51
Published inInfoSec Write-upsFinding my First SQL Injection On HackerOneSQL injections have been a persistent aspect of web application security, maintaining their position on OWASP’s top 10 vulnerabilities year…Jan 195Jan 195
Published inLevel Up CodingClippy the Microsoft Vulnerability ScannerRecently, I completed an internal penetration test as part of a client engagement, where I gained remote access to multiple PCs using old…Dec 12, 2024Dec 12, 2024
The 500 Hour RuleWe’ve all heard of the 10,000-hour rule — a guideline for achieving mastery in a skill. But what about the journey before mastery? If…Dec 10, 2024Dec 10, 2024
Published inLevel Up CodingCreating An AI That Plays Snake In CBuilding the classic Snake game in C is a project every programmer should try at least once. It’s a fun way to dive into game development…Nov 14, 2024Nov 14, 2024
Published inInfoSec Write-upsExploring The Impersonator ShellThe Impersonator Shell was a program aimed at giving a reverse shell the ability to manipulate and abuse Windows access tokens through the…Oct 27, 2024Oct 27, 2024
Published inLevel Up CodingScraping LinkedIn Data With PythonGathering Data For Red Team EngagementsApr 7, 20241Apr 7, 20241