React2Shell — CVE-2025–55182: Practical Exploitation of the Vulnerability
Exploiting Northport Ledger application with RSC component In a previous post, we explored React2Shell as a concept and how insecure deserialization …
Read More →I'll be graduating from the University of Maryland, College Park in May 2026, currently finishing my Master’s in Cybersecurity along with a Graduate Certificate in Cloud Engineering.
I'm actively looking for a full-time role in Security Engineering, IR/SOC Analyst, or AppSec roles, and I am open to relocating.
I focus more on builing and automating security Systems. A large part of my work involves automation and AI/LLM-assisted security workflows, especially for log analysis, threat modeling, and incident triaging.
I do write a lot of Blogs, building and contributing to open-source security tools, experimenting new AI/LLM, and work on projects that simulate real-world attacks and defensive response.
Let's stay in touch :)
Emulating adversary techniques and automating D&R with LimaCharlie, Tines and Slack
An automated vulnerability scanning pipeline which involves Cloud, AI and Security Integration.
PowerShell-based automation sets up your Obsidian vault to sync with a private GitHub repo
/students/edit/{id} and modify
student records. Affects all v2.0 builds/course/edit/{id} and modify
course data. Affects all v2.0 buildsOriginal Research
Exploiting Northport Ledger application with RSC component In a previous post, we explored React2Shell as a concept and how insecure deserialization …
Read More →Vuln with easy chain and CVSS:10 After so long i have been writing blog and I have been researching on this vuln. I know time has passed on this but …
Read More →The Tunnel Without Walls Report — HTB Holmes Scenario: A memory dump from a connected Linux machine reveals covert network connections, fake …
Read More →