Shriyans SudhiinInfoSec Write-upsLogin DoS — That requires simply sending a lot of specially crafted requestsHi there,7 min read·Jan 20, 2024--2--2
Shriyans SudhiinInfoSec Write-upsCTBB Podcast — Attack Vector IdeationIn this article, I share my views mixed with Justin’s ideas in his video4 min read·Oct 29, 2023--1--1
Shriyans SudhiinInfoSec Write-upsMy experience with BugBase copilotMy first experience with bugbase pentest copilot (AI)5 min read·Sep 2, 2023----
Shriyans SudhiinInfoSec Write-upsAutomated Monitoring + Time = Bug, the bug on HackerOne Target (8x8)How I found a bug with the help of 100% automation3 min read·May 31, 2023--1--1
Shriyans SudhiinInfoSec Write-upsWardrive without a GPS module and WiFi adapter that supports monitor mode, but a Raspberry PiCollect WiFi data of a location with the help of a mobile and a raspberry pi, and plot it on a map6 min read·Feb 1, 2023----
Shriyans SudhiinInfoSec Write-upsSetting up your bug bounty scripts with Python and BashHow to set up python and bash scripts for bug bounty automation for powerful automation? Thought about this ever? Read this article to…8 min read·Dec 30, 2022----
Shriyans SudhiinInfoSec Write-upsMonitoring your targets for bug bountiesAn intro to setting up a monitoring system for your bug bounty target6 min read·Sep 26, 2022----
Shriyans SudhiinInfoSec Write-upsLog Poisoning — Inject payloads in logsLogs… These are the files, in which all the activities on a server are stored. These are used for monitoring, troubleshooting, fixing bugs…4 min read·Apr 4, 2022--1--1
Shriyans SudhiVishwaCTF-22 => John the rocker (Cryptography)Detailed writeup for John the Rocker (VishwaCTF-22, Cryptography)2 min read·Mar 22, 2022----
Shriyans SudhiVishwaCTF-22 => Overcook (Reverse Engineering)Detailed writeup for VishwaCTF-Overcook (Reverse Engineering)2 min read·Mar 22, 2022----