Forem

Hafiz Shamnad profile picture

Hafiz Shamnad

Cybersecurity Researcher | Security Tools Developer | CPT | Python, Java, Bash, MySQL | Threat Hunter | Incident Responder | Bug Bounty Hunting | TryHackMe Top 2% | Enhancing Security Posture

Location Kerala, India Joined Joined on  Personal website https://hafiz-shamnad.vercel.app/
Day 21 — The Heist in Milliseconds — Cracking NovaPay with a Race Condition TOCTOU Attack
Cover image for Day 21 — The Heist in Milliseconds — Cracking NovaPay with a Race Condition TOCTOU Attack

Day 21 — The Heist in Milliseconds — Cracking NovaPay with a Race Condition TOCTOU Attack

1
Comments
7 min read

Want to connect with Hafiz Shamnad?

Create an account to connect with Hafiz Shamnad. You can also sign in below to proceed if you already have an account.

Already have an account? Sign in
Day 20 — A Deep Dive into Open Redirect Vulnerabilities in Flask – From Exploitation to Ironclad Fixes
Cover image for Day 20 — A Deep Dive into Open Redirect Vulnerabilities in Flask – From Exploitation to Ironclad Fixes

Day 20 — A Deep Dive into Open Redirect Vulnerabilities in Flask – From Exploitation to Ironclad Fixes

Comments
6 min read
Day 19 — How I Built a File Integrity Monitor in Python to Detect File Tampering
Cover image for Day 19 — How I Built a File Integrity Monitor in Python to Detect File Tampering

Day 19 — How I Built a File Integrity Monitor in Python to Detect File Tampering

2
Comments
10 min read
Day 18 — Building a Linux Vulnerability Analyzer
Cover image for Day 18 — Building a Linux Vulnerability Analyzer

Day 18 — Building a Linux Vulnerability Analyzer

2
Comments
6 min read
Every Hacker Should Build This Active Directory Lab
Cover image for Every Hacker Should Build This Active Directory Lab

Every Hacker Should Build This Active Directory Lab

2
Comments
8 min read
Day 17 — I Built a Vulnerable API to Demonstrate a Mass Assignment Attack
Cover image for Day 17 — I Built a Vulnerable API to Demonstrate a Mass Assignment Attack

Day 17 — I Built a Vulnerable API to Demonstrate a Mass Assignment Attack

Comments
3 min read
Day 16 — I Bypassed My Own Flask Login (And Fixed It Properly)
Cover image for Day 16 — I Bypassed My Own Flask Login (And Fixed It Properly)

Day 16 — I Bypassed My Own Flask Login (And Fixed It Properly)

Comments
5 min read
Day 15 — I Built PassAudit : A Real-Time Password Security Analyzer (and it revealed how predictable we are)
Cover image for Day 15 — I Built PassAudit : A Real-Time Password Security Analyzer (and it revealed how predictable we are)

Day 15 — I Built PassAudit : A Real-Time Password Security Analyzer (and it revealed how predictable we are)

Comments
6 min read
Day 14 — I Built ProcWatch : A Linux Process Security Scanner for Forensics & Incident Response
Cover image for Day 14 — I Built ProcWatch : A Linux Process Security Scanner for Forensics & Incident Response

Day 14 — I Built ProcWatch : A Linux Process Security Scanner for Forensics & Incident Response

2
Comments 2
4 min read
Day 13 — I Stopped Trusting File Names and Started Inspecting Files (SafeOpen v2)
Cover image for Day 13 — I Stopped Trusting File Names and Started Inspecting Files (SafeOpen v2)

Day 13 — I Stopped Trusting File Names and Started Inspecting Files (SafeOpen v2)

Comments
4 min read
Day 12 — I Built a File Safety Checker in Python (and Accidentally Learned How Malware Tricks Humans)
Cover image for Day 12 — I Built a File Safety Checker in Python (and Accidentally Learned How Malware Tricks Humans)

Day 12 — I Built a File Safety Checker in Python (and Accidentally Learned How Malware Tricks Humans)

6
Comments 1
3 min read
Day 11 — I Built My Own SIEM-Style Log Analyzer (LogGuardian) in Pure Python
Cover image for Day 11 — I Built My Own SIEM-Style Log Analyzer (LogGuardian) in Pure Python

Day 11 — I Built My Own SIEM-Style Log Analyzer (LogGuardian) in Pure Python

2
Comments
3 min read
When Points Matter More Than Learning

When Points Matter More Than Learning

1
Comments
3 min read
Day 10 — Building a Legitimate Pentesting Tool – The HTTP Security Header Scanner

Day 10 — Building a Legitimate Pentesting Tool – The HTTP Security Header Scanner

Comments
3 min read
Day 9 — Secret-Scout : Building a Secrets Detection Tool for Secure Codebases

Day 9 — Secret-Scout : Building a Secrets Detection Tool for Secure Codebases

Comments
5 min read
Day 8 — Insecure Direct Object Reference (IDOR) Vulnerability in Web Applications: A Practical Demonstration with Flask
Cover image for Day 8 — Insecure Direct Object Reference (IDOR) Vulnerability in Web Applications: A Practical Demonstration with Flask

Day 8 — Insecure Direct Object Reference (IDOR) Vulnerability in Web Applications: A Practical Demonstration with Flask

3
Comments
6 min read
Day 7 — Cross-Site Request Forgery (CSRF) in Flask: Account Takeover via Session Riding & Proper Mitigation
Cover image for Day 7 — Cross-Site Request Forgery (CSRF) in Flask: Account Takeover via Session Riding & Proper Mitigation

Day 7 — Cross-Site Request Forgery (CSRF) in Flask: Account Takeover via Session Riding & Proper Mitigation

1
Comments
6 min read
Day 6 — I Built a Profile Picture Upload… and turned My Website into a Malware Host
Cover image for Day 6 — I Built a Profile Picture Upload… and turned My Website into a Malware Host

Day 6 — I Built a Profile Picture Upload… and turned My Website into a Malware Host

1
Comments
3 min read
Day 5 — Intentionally Building and Breaking an SSTI Vulnerability (Flask + Jinja2)

Day 5 — Intentionally Building and Breaking an SSTI Vulnerability (Flask + Jinja2)

Comments
4 min read
Day 4 — I Built a Program That Caught a Reverse Shell
Cover image for Day 4 — I Built a Program That Caught a Reverse Shell

Day 4 — I Built a Program That Caught a Reverse Shell

Comments
3 min read
Day 3 — Building a Computer That Keeps Evidence
Cover image for Day 3 — Building a Computer That Keeps Evidence

Day 3 — Building a Computer That Keeps Evidence

4
Comments
4 min read
Day 2 - Teaching Nmap to Think Like a Pentester (Python + Regex)
Cover image for Day 2 - Teaching Nmap to Think Like a Pentester (Python + Regex)

Day 2 - Teaching Nmap to Think Like a Pentester (Python + Regex)

Comments
2 min read
Day 1 — Back to Scratch: Relearning Python Without Autopilot
Cover image for Day 1 — Back to Scratch: Relearning Python Without Autopilot

Day 1 — Back to Scratch: Relearning Python Without Autopilot

1
Comments
2 min read
Two Critical n8n Vulnerabilities: Sandbox Escapes Leading to Full Remote Code Execution

Two Critical n8n Vulnerabilities: Sandbox Escapes Leading to Full Remote Code Execution

Comments
4 min read
loading...