top of page
Table of Content


Mastering Sigma Rules: A Deep Dive into Writing Detection Rules for Modern SIEMs
Learn how to write Sigma rules for threat detection in modern SIEM platforms.
Akshay Jain
5 min read
39 views
1 comment


SEO Poisoning Attacks: When Google Becomes the Attack Vector
SEO Poisoning Attacks: When Google Becomes the Attack Vector
Akshay Jain
4 min read
21 views
0 comments


Swamp CTF 2025 - Web Walkthrough Part 1
Explore the Swamp CTF Serialies challenge walkthrough using Gobuster for directory enumeration and source code analysis.
Akshay Jain
2 min read
83 views
1 comment


Swamp CTF 2025 - Misc Walkthrough
Swamp CTF Misc Challenge 1: Pretty Picture: Double Exposure Description: Hidden in the bits below, an image wait's to be shown....
Akshay Jain
5 min read
82 views
0 comments


Swamp CTF 2025 - Crypto - Rock my Password Walkthrough
Learn how to reverse-engineer a multi-hashed password from a Swamp CTF challenge using RockYou wordlist and Python scripting.
Akshay Jain
2 min read
80 views
1 comment
bottom of page