top of page


Running a Blockchain locally can help restore data from a ransomware attack using the IPFS File System.
What if we could use a hacker’s favorite buzzwords — blockchain and decentralization — to fight back against ransomware? As a cybersecurity grad student, I often build and test real-world attack scenarios. But this time, I wanted to take it one step further. Instead of just detecting or analyzing ransomware, I wanted to create a backup system that could survive it completely and even recover files without paying a dime. And it worked. Using IPFS for file storage, a smart cont
2 days ago4 min read


Digital Image Forensics: My Approach to Detecting Image Manipulation
In today’s digital world, anyone can alter an image with just a few clicks. Because of this, I wanted my digital forensics project to focus on a real investigative challenge: how can we scientifically determine whether an image is authentic or manipulated? Using a combination of forensic tools and structured analysis, I examined how metadata, compression signatures, pixel inconsistencies, and cloned regions expose tampered photographs. The posters I created visually summariz
Dec 95 min read


Augmented Reality Plant Disease Detection Using Python, OpenCV, and CNN
Augmented Reality Plant Disease Detection Repository: https://github.com/prabhu31297/Plant-Disease-Detection-using-OpenCV Introduction In 2019, during the final phase of my undergraduate degree, I set out to build something that was both technically challenging and directly useful in the real world. Agriculture is still the backbone of India’s economy, yet many farmers lose a significant portion of their harvest because plant diseases are detected too late or misdiagnosed. Di
Nov 248 min read


Building “Tetrisgame”: A Full CI/CD Pipeline on AWS with ECS Fargate, ECR, CodeBuild & CodePipeline
In this project, I wanted to take something simple and visual – a Tetris-style web page – and use it to practice real DevOps on AWS : Containerize an app with Docker Push images to Amazon ECR Run containers with ECS Fargate Expose it to the internet Automate builds and deployments using CodeBuild + CodePipeline Deal with real-world issues like ARM vs AMD64 images, security groups, and image pulls The result is a small but production-style pipeline that you can reuse for any
Nov 185 min read


Compression and Encryption - How does it look in binary?
When managing files on a computer, you might encounter the terms "encryption" and "compression." Both alter your data, but for entirely...
Sep 63 min read


Reverse Engineering : Apple’s AirTag
Imagine losing your keys in a coffee shop. Hours later, you're staring at your iPhone, which pinpoints their last known location on a map—thanks to a tiny AirTag and an anonymous stranger’s iPhone. But here’s the catch: Neither Apple, nor that stranger, nor even the AirTag itself knows your keys were found. At least, that’s what the marketing says. For our graduate project in Network Security , I dissected the Apple AirTag’s cryptographic design . We explored public resea
Jun 214 min read


Exploiting Web Applications: Identifying Weaknesses and Vulnerabilities - Part 1
Web Application: This acts as the interface between users and web servers through web pages. It enables users to request, submit, and...
May 195 min read


“I love you in different languages.”
This blog explores that intent through the lens of the simplest, most powerful phrase: I love you. Shell Scripting Languages Bash:...
May 192 min read


Mastering OT Cybersecurity: A Deep-Dive Implementation Blueprint with ATT&CK Reference Architecture
Introduction: Cybersecurity is no longer a sidekick in today’s enterprise environments. With the rise of interconnected industrial...
May 194 min read


Breaking the Signal: Going into the wireless network
To footprint a wireless network, We must identify the BSS (Basic Service Set) or Independent BSS (IBSS) provided by the access point....
Jan 43 min read


Art of Reconnaissance: From Battlefield to Browser - PART 0010
0010 : Footprinting Through Web services Web Services: Platforms like social networks and job sites reveal organizational data (e.g.,...
Dec 23, 20245 min read


Art of Reconnaissance: From Battlefield to Browser — PART 0001
Ancient and Medieval Techniques Scouts and Spies : Greeks, Romans, and Chinese used scouts and spies to gather intel on enemies. Assyrian...
Dec 22, 20244 min read


Behind the Commendation: Cyberforce 2024 and My Approach to Vulnerability Documentation.
When I worked on the vulnerability documentation for the Cyberforce program 2024, I focused on making it clear, structured, and easy to...
Dec 12, 20243 min read


S3 Buckets and Privilege Elevation: What Could Go Wrong?
1. Cracking the Cloud: Public or misconfigured S3 Buckets, what I excited and Security Oopsies. Amazon offers something called blob...
Dec 11, 20244 min read


MARIE - Assembly Language Programs
Let’s talk about some Marie programs! 1. Introduction of Marie Please refer to the below 2 resources to learn the introduction of Marie...
Feb 29, 20248 min read


Computer Breach and Data Loss (Basic Essential)
Overview of the Incident: A hacker gained access to the company's network through a phishing email that was sent to an employee. The...
Feb 28, 20247 min read
bottom of page