Exploiting BASC 20T: A Deep Dive
Introduction to BASC 20T Vulnerability The BASC 20T controller is a widely used device in industrial control systems (ICS). Recently, a vulnerability …
Security Researcher & Penetration Tester
// _
Breaking systems to make them stronger. I find vulnerabilities before the bad actors do — turning weaknesses into hardened defences through ethical hacking and rigorous testing.
Cybersecurity professional with a relentless curiosity for breaking things and a disciplined methodology for fixing them. From corporate internships at Fortune 500 companies to late-night CTF sessions, every experience sharpens the blade.
A lightweight, modular penetration testing toolkit built in Python. Automates reconnaissance, vulnerability scanning, and report generation — all from a single command. Designed for pentesters who need quick results without heavy frameworks.
Complete walkthrough of the TryHackMe Mr. Robot machine — all 3 flags captured through web …
Read Write-up →Exploiting the infamous EternalBlue vulnerability on the TryHackMe Blue machine using Metasploit.
Read Write-up →Walkthrough of the first three HackTheBox Starting Point machines covering Telnet, FTP, and SMB …
Read Write-up →Introduction to BASC 20T Vulnerability The BASC 20T controller is a widely used device in industrial control systems (ICS). Recently, a vulnerability …
Introduction to Supply Chain Attacks As a security engineer, I’ve seen a significant rise in supply chain attacks, where attackers target the …
Introduction to CISA KEV Remediation The Cybersecurity and Infrastructure Security Agency (CISA) Known Exploited Vulnerabilities (KEV) catalog is a …
Let's connect — whether it's about a role, a project, or breaking into systems (ethically, of course).