top of page


How I Hosted a Website on the Dark Web and How It Prevents Anyone from Tracing Back to the Client IP.
There are different types of Darkweb networks, which are Tor,I2P ,Freenet,ZeroNet and GNUnet. Each have their own network use: Privacy is about having control over your own information and that's exactly what Cybersecurity about too, protect and control your assets and information. When you think about it, the Dark Web follows that same principle as well. i would like to talk about Tor Network : When a person opens Tor Browser and types a website address, they are not conn
prabhu perumal
Mar 37 min read


Running a Blockchain locally can help restore data from a ransomware attack using the IPFS File System.
What if we could use a hacker’s favorite buzzwords — blockchain and decentralization — to fight back against ransomware? As a cybersecurity grad student, I often build and test real-world attack scenarios. But this time, I wanted to take it one step further. Instead of just detecting or analyzing ransomware, I wanted to create a backup system that could survive it completely and even recover files without paying a dime. And it worked. Using IPFS for file storage, a smart cont
prabhu perumal
Dec 15, 20254 min read


Digital Image Forensics: My Approach to Detecting Image Manipulation
In today’s digital world, anyone can alter an image with just a few clicks. Because of this, I wanted my digital forensics project to focus on a real investigative challenge: how can we scientifically determine whether an image is authentic or manipulated? Using a combination of forensic tools and structured analysis, I examined how metadata, compression signatures, pixel inconsistencies, and cloned regions expose tampered photographs. The posters I created visually summariz
Prabhu Perumal
Dec 9, 20255 min read


Augmented Reality Plant Disease Detection Using Python, OpenCV, and CNN
Augmented Reality Plant Disease Detection Repository: https://github.com/prabhu31297/Plant-Disease-Detection-using-OpenCV Introduction In 2019, during the final phase of my undergraduate degree, I set out to build something that was both technically challenging and directly useful in the real world. Agriculture is still the backbone of India’s economy, yet many farmers lose a significant portion of their harvest because plant diseases are detected too late or misdiagnosed. Di
prabhu perumal
Nov 24, 20258 min read


Building “Tetrisgame”: A Full CI/CD Pipeline on AWS with ECS Fargate, ECR, CodeBuild & CodePipeline
In this project, I wanted to take something simple and visual – a Tetris-style web page – and use it to practice real DevOps on AWS : Containerize an app with Docker Push images to Amazon ECR Run containers with ECS Fargate Expose it to the internet Automate builds and deployments using CodeBuild + CodePipeline Deal with real-world issues like ARM vs AMD64 images, security groups, and image pulls The result is a small but production-style pipeline that you can reuse for any
prabhu perumal
Nov 18, 20255 min read


Reverse Engineering : Apple’s AirTag
Imagine losing your keys in a coffee shop. Hours later, you're staring at your iPhone, which pinpoints their last known location on a map—thanks to a tiny AirTag and an anonymous stranger’s iPhone. But here’s the catch: Neither Apple, nor that stranger, nor even the AirTag itself knows your keys were found. At least, that’s what the marketing says. For our graduate project in Network Security , I dissected the Apple AirTag’s cryptographic design . We explored public resea
prabhu perumal
Jun 22, 20254 min read
bottom of page