Blog
Deep dives into security research, reverse engineering, and cybersecurity best practices
How a Website Works: The Journey from URL to Interface
Ever wondered what happens when you type a website URL? Hereβs a clear, security-focused walkthrough of every step that brings a webpage to life.
Defensive Guide to Advanced XSS Risks: Detection, Mitigation, and Safe Lab Testing
How advanced XSS can be used to abuse client-side execution, the defensive controls that stop session exfiltration, and safe lab methods to validat...
File Upload Vulnerabilities - From Direct Shell Uploads to Polyglot Bypasses
A detailed technical report analyzing File Upload vulnerabilities from Level 1 to Level 6, including bypass methods, lessons learned, and secure mi...
Welcome to My Blog - Journey to Becoming a Penetration Tester
Starting my journey in offensive security and penetration testing. Learn about my 'Learn by Doing' philosophy, hands-on labs, and goals for becomin...