Forem

Harsh Kanojia profile picture

Harsh Kanojia

Motivated cybersecurity professional focused on protecting digital systems, mastering security tools, and building strong defenses.

Education

Master’s in Cyber Security at Deakin University

Pronouns

He/Him

Work

Offensive Security Researcher, Founder of Cyber Sphere Community

💡 The Hidden Cost of Trusting Default Security Po
Cover image for 💡 The Hidden Cost of Trusting Default Security Po

💡 The Hidden Cost of Trusting Default Security Po

1
Comments
4 min read
🔒 The Shadow of Default Configurations
Cover image for 🔒 The Shadow of Default Configurations

🔒 The Shadow of Default Configurations

Comments
4 min read
🔒 The Hidden Cost of Dependency Confusion
Cover image for 🔒 The Hidden Cost of Dependency Confusion

🔒 The Hidden Cost of Dependency Confusion

Comments
4 min read
⚙️ Endpoint Evasion Lessons Learned

⚙️ Endpoint Evasion Lessons Learned

Comments
4 min read
🔎 The Evasion of Simple File Hashing

🔎 The Evasion of Simple File Hashing

1
Comments
4 min read
🔍 The Silent Path to RCE: Exploiting Misconfig
Cover image for 🔍 The Silent Path to RCE: Exploiting Misconfig

🔍 The Silent Path to RCE: Exploiting Misconfig

1
Comments
4 min read
The Unseen Path in Patching Failures
Cover image for The Unseen Path in Patching Failures

The Unseen Path in Patching Failures

Comments
4 min read
🔍 RCE in Plain Sight: The Forgotten SMB Relay
Cover image for 🔍 RCE in Plain Sight: The Forgotten SMB Relay

🔍 RCE in Plain Sight: The Forgotten SMB Relay

Comments
4 min read
🎯 Hunting In-Memory Shellcode Evasion
Cover image for 🎯 Hunting In-Memory Shellcode Evasion

🎯 Hunting In-Memory Shellcode Evasion

Comments
5 min read
👻 EDR Evasion: Unhooking the Kernel
Cover image for 👻 EDR Evasion: Unhooking the Kernel

👻 EDR Evasion: Unhooking the Kernel

Comments
6 min read
⚙️ AWS STS: Hidden Privilege Escalation
Cover image for ⚙️ AWS STS: Hidden Privilege Escalation

⚙️ AWS STS: Hidden Privilege Escalation

1
Comments
6 min read
💡 LSA Dumps: The EDR Blind Spot
Cover image for 💡 LSA Dumps: The EDR Blind Spot

💡 LSA Dumps: The EDR Blind Spot

Comments
5 min read
👻 PowerShell In-Memory Bypass Tactics
Cover image for 👻 PowerShell In-Memory Bypass Tactics

👻 PowerShell In-Memory Bypass Tactics

Comments
5 min read
💀 EDR Blind Spots: Kernel Callbacks

💀 EDR Blind Spots: Kernel Callbacks

2
Comments
6 min read
👻 Living Off The Land Evasion
Cover image for 👻 Living Off The Land Evasion

👻 Living Off The Land Evasion

Comments
5 min read
📧 Exchange Evasion: C2 Over MAPI
Cover image for 📧 Exchange Evasion: C2 Over MAPI

📧 Exchange Evasion: C2 Over MAPI

Comments
6 min read
🔑 Cloud Policy Abuse: The IAM Blind Spot
Cover image for 🔑 Cloud Policy Abuse: The IAM Blind Spot

🔑 Cloud Policy Abuse: The IAM Blind Spot

Comments
6 min read
🛡️ Cloud Identity Theft: The K8s Blind Spot
Cover image for 🛡️ Cloud Identity Theft: The K8s Blind Spot

🛡️ Cloud Identity Theft: The K8s Blind Spot

Comments
5 min read
🕵️ IMDS Exploitation Blind Spots
Cover image for 🕵️ IMDS Exploitation Blind Spots

🕵️ IMDS Exploitation Blind Spots

Comments
5 min read
🔑 Token Confusion: Cloud Identity Drift
Cover image for 🔑 Token Confusion: Cloud Identity Drift

🔑 Token Confusion: Cloud Identity Drift

Comments
5 min read
⚙️ Persistent Threat Via Environment Vars
Cover image for ⚙️ Persistent Threat Via Environment Vars

⚙️ Persistent Threat Via Environment Vars

Comments
6 min read
loading...