DEV Community

Hafiz Shamnad profile picture

Hafiz Shamnad

Cybersecurity Researcher | Security Tools Developer | CPT | Python, Java, Bash, MySQL | Threat Hunter | Incident Responder | Bug Bounty Hunting | TryHackMe Top 2% | Enhancing Security Posture

Location Kerala, India Joined Joined on  Personal website https://hafiz-shamnad.vercel.app/
Day 20 — How I Built a File Integrity Monitor in Python to Detect File Tampering

Day 20 — How I Built a File Integrity Monitor in Python to Detect File Tampering

Comments
10 min read

Want to connect with Hafiz Shamnad?

Create an account to connect with Hafiz Shamnad. You can also sign in below to proceed if you already have an account.

Already have an account? Sign in
Day 18 — Building a Linux Vulnerability Analyzer

Day 18 — Building a Linux Vulnerability Analyzer

2
Comments
6 min read
Every Hacker Should Build This Active Directory Lab

Every Hacker Should Build This Active Directory Lab

2
Comments
8 min read
Day 17 — I Built a Vulnerable API to Demonstrate a Mass Assignment Attack

Day 17 — I Built a Vulnerable API to Demonstrate a Mass Assignment Attack

Comments
3 min read
Day 16 — I Bypassed My Own Flask Login (And Fixed It Properly)

Day 16 — I Bypassed My Own Flask Login (And Fixed It Properly)

Comments
5 min read
Day 15 — I Built PassAudit : A Real-Time Password Security Analyzer (and it revealed how predictable we are)

Day 15 — I Built PassAudit : A Real-Time Password Security Analyzer (and it revealed how predictable we are)

Comments
6 min read
Day 14 — I Built ProcWatch : A Linux Process Security Scanner for Forensics & Incident Response

Day 14 — I Built ProcWatch : A Linux Process Security Scanner for Forensics & Incident Response

2
Comments 2
4 min read
Day 13 — I Stopped Trusting File Names and Started Inspecting Files (SafeOpen v2)

Day 13 — I Stopped Trusting File Names and Started Inspecting Files (SafeOpen v2)

Comments
4 min read
Day 12 — I Built a File Safety Checker in Python (and Accidentally Learned How Malware Tricks Humans)

Day 12 — I Built a File Safety Checker in Python (and Accidentally Learned How Malware Tricks Humans)

6
Comments 1
3 min read
Day 11 — I Built My Own SIEM-Style Log Analyzer (LogGuardian) in Pure Python

Day 11 — I Built My Own SIEM-Style Log Analyzer (LogGuardian) in Pure Python

2
Comments
3 min read
When Points Matter More Than Learning

When Points Matter More Than Learning

1
Comments
3 min read
Day 10 — Building a Legitimate Pentesting Tool – The HTTP Security Header Scanner

Day 10 — Building a Legitimate Pentesting Tool – The HTTP Security Header Scanner

Comments
3 min read
Day 9 — Secret-Scout : Building a Secrets Detection Tool for Secure Codebases

Day 9 — Secret-Scout : Building a Secrets Detection Tool for Secure Codebases

Comments
5 min read
Day 8 — Insecure Direct Object Reference (IDOR) Vulnerability in Web Applications: A Practical Demonstration with Flask

Day 8 — Insecure Direct Object Reference (IDOR) Vulnerability in Web Applications: A Practical Demonstration with Flask

3
Comments
6 min read
Day 7 — Cross-Site Request Forgery (CSRF) in Flask: Account Takeover via Session Riding & Proper Mitigation

Day 7 — Cross-Site Request Forgery (CSRF) in Flask: Account Takeover via Session Riding & Proper Mitigation

1
Comments
6 min read
Day 6 — I Built a Profile Picture Upload… and turned My Website into a Malware Host

Day 6 — I Built a Profile Picture Upload… and turned My Website into a Malware Host

1
Comments
3 min read
Day 5 — Intentionally Building and Breaking an SSTI Vulnerability (Flask + Jinja2)

Day 5 — Intentionally Building and Breaking an SSTI Vulnerability (Flask + Jinja2)

Comments
4 min read
Day 4 — I Built a Program That Caught a Reverse Shell

Day 4 — I Built a Program That Caught a Reverse Shell

Comments
3 min read
Day 3 — Building a Computer That Keeps Evidence

Day 3 — Building a Computer That Keeps Evidence

4
Comments
4 min read
Day 2 - Teaching Nmap to Think Like a Pentester (Python + Regex)

Day 2 - Teaching Nmap to Think Like a Pentester (Python + Regex)

Comments
2 min read
Day 1 — Back to Scratch: Relearning Python Without Autopilot

Day 1 — Back to Scratch: Relearning Python Without Autopilot

1
Comments
2 min read
Two Critical n8n Vulnerabilities: Sandbox Escapes Leading to Full Remote Code Execution

Two Critical n8n Vulnerabilities: Sandbox Escapes Leading to Full Remote Code Execution

Comments
4 min read
loading...