top of page
Table of Content


API Hacking Uncovered: Deep Dive into Broken Function Level Authorization (BFLA) and Broken Object Level Authorization (BOLA)
Discover how Broken Function Level Authorization (BFLA) and Broken Object Level Authorization (BOLA) expose APIs to serious risks.
Akshay Jain
3 min read
2 views
0 comments


Mastering Sigma Rules: A Deep Dive into Writing Detection Rules for Modern SIEMs
Learn how to write Sigma rules for threat detection in modern SIEM platforms.
Akshay Jain
5 min read
40 views
1 comment


SEO Poisoning Attacks: When Google Becomes the Attack Vector
SEO Poisoning Attacks: When Google Becomes the Attack Vector
Akshay Jain
4 min read
24 views
0 comments


Swamp CTF 2025 - Web Walkthrough Part 1
Explore the Swamp CTF Serialies challenge walkthrough using Gobuster for directory enumeration and source code analysis.
Akshay Jain
2 min read
88 views
1 comment


Swamp CTF 2025 - Misc Walkthrough
Swamp CTF Misc Challenge 1: Pretty Picture: Double Exposure Description: Hidden in the bits below, an image wait's to be shown....
Akshay Jain
5 min read
88 views
0 comments
bottom of page