Securing Deeplinks in AndroidHello folks, I’m back with another write-up, and today I have something even more interesting for you guys as I have linked my short on the…Jun 5Jun 5
Security Implementations at different layers of the OSI ModelSecuring real-world applications and software involves implementing various security measures at different layers of the OSI (Open Systems…Apr 1Apr 1
Practical RegEx Cheat SheetI like keeping notes. Making a publicly accessible repository of handy notes. Help yourselves!Sep 15, 2023Sep 15, 2023
Debunking RegEx — Part 2aHope you enjoyed the 1st part and practiced a few RegEx yourself. If not, maybe this might help!Aug 28, 2023Aug 28, 2023
Fine-Tuning Memory Allocation on Virtual MachinesI often end up using Virtual Machines as a part of my research. Every operating system has some pros and cons. Working on different…Aug 27, 2023Aug 27, 2023
Debunking RegEx — Part 1Catching up on the concepts I need in my hacking arsenal, I came across regEx. There have been quite a few mentions regarding the…Aug 13, 2023Aug 13, 2023