Building security, one byte at a time.

WELCOME TO MY SPACE!

EXPLORE WITH ME
ABOUT CYBERSECURITY

Check out my projects

Make your own Pentest Lab - Part 1 (The Creation)

At RIT (Rochester Institute of Technology), during the course Computer System Security, we were required to create a pentest lab or…

Make your own Pentest Lab - Part 2 (The Lookout)

After the creation of the vulnerable victim machine explained in Part 1, we had to set up the vulnerable machine with an SIEM, to…

Make your own Pentest Lab - Part 3 (The War)

Part 2 detailed the process of setting up Wazuh SIEM, as well as how it logs and presents information. In this part, it’s about how we…

Make your own Pentest Lab - Part 4 (The Revelation)

After spending hours (reasonably long time) breaking into other machines and exploiting vulnerabilities, it’s time to see what happened to…

How I Built a Portable IDS on a Cheap Android Box

A few weeks ago, I got my hands on an old Android TV box from a telecom company. It had an ARM A7 processor, 2GB RAM, and 8GB storage—…

OGPhish — Social Media Phishing via Open Graph Abuse

While sharing links of different websites online, I came across the feature of Open Graph metadata or metatag, which many websites utilize to provide better visibility of their content of that website...

Report: Shutting down a Salik phishing website

An SMS from “Salik” which asks user that a toll amount that has not been paid. As of 02–06–2025, 11:13 pm, only this website works -https://sailikaeoiem.com/ii/home.html.

MORE KNOWLEDGE = MORE POWER