Technical Blog
- How to build an offensive AI security agent
- The Future of Application Security: Integrating LLMs and AI Agents into Manual Workflows
- A Guide To Identify Authorization Vulnerabilities At Scale Using Semgrep
- A Guide On Implementing An Effective SAST Workflow
- A Lightweight Approach To Implement Secure Software Development LifeCycle (Secure SDLC)
- Product Security Roadmap
- Building a Product Security program from scratch
- Ability to send payment requests inspite of being blocked by the recipient
- A CSRF protection bypass technique
- A bug in Facebook that violated my privacy
- Analysis of the BrowserStack breach - A classic example of "Pivoting in the Clouds"
- Security issues with friction-less signup flows
- Performing code review on shell scripts