INTEL_FEED

SECURITY BLOG

Insights, tutorials, and discoveries from my cybersecurity journey

FEATURED /// CRITICAL_UPDATE

Advanced SQL Injection: Unmasking Second-Order Vulnerabilities

A comprehensive exploration of second-order SQL injection attacks, advanced exploitation techniques including time-based blind injection, UNION attacks, and out-of-band exfiltration.

Feb 2, 2026 25 min read Web Security
READ_FULL_ENTRY
XSS Attack WEB_SECURITY

Understanding XSS Attacks

Complete breakdown of Cross-Site Scripting and modern defense mechanisms.

READ_ENTRY Feb 01, 2026
Hacker CULTURE

The Many Hats of Hackers

White hat, Black hat, Grey hat - demystifying the colors of cybersecurity.

READ_ENTRY Jan 28, 2026
Deep Dive DEEP_DIVE

Security Deep Dive

Analyzing the architecture of a secure web project: CSP, Headers, and Encryption.

READ_ENTRY Jan 25, 2026
Automation FUTURE

AI Automation: The Future

How intelligent agents are reshaping the way we work and code.

READ_ENTRY Jan 20, 2026
Hacking PENTEST

Web Vulnerability Assessment

Finding and fixing SQL Injection and XSS in a standard LAMP stack application.

READ_ENTRY Jan 15, 2026
Hospital CPP_DEV

Hospital Management in C++

Building robust console applications with file handling and OOP principles.

READ_ENTRY Jan 10, 2026
SecureVault PROJECT

Introducing SecureVault

A local-first, zero-knowledge password manager built for privacy enthusiasts.

READ_ENTRY Jan 05, 2026
AI Tools AI_TOOLS

10 AI Tools to Save 10 Hours

Optimizing your workflow with the latest artificial intelligence solutions.

READ_ENTRY Dec 28, 2025
GhostKey MALWARE

Exploring a Simple Python Keylogger

Educational analysis of GhostKey - understanding endpoint surveillance and defense.

READ_ENTRY Dec 20, 2025