DEV Community

Harsh Kanojia profile picture

Harsh Kanojia

Motivated cybersecurity professional focused on protecting digital systems, mastering security tools, and building strong defenses.

Education

Master’s in Cyber Security at Deakin University

Pronouns

He/Him

Work

Offensive Security Researcher, Founder of Cyber Sphere Community

Cyber Threats Demystified for Beginners

Cyber Threats Demystified for Beginners

Comments
3 min read
Phishing Attacks Explained Simply

Phishing Attacks Explained Simply

Comments
3 min read
The Sneaky Side of Password Managers

The Sneaky Side of Password Managers

Comments
3 min read
Simple Guide to Phishing Attacks

Simple Guide to Phishing Attacks

Comments
4 min read
The Hidden Cost of Weak Passwords

The Hidden Cost of Weak Passwords

1
Comments 1
3 min read
Cloud Misconfiguration The Hidden Danger

Cloud Misconfiguration The Hidden Danger

1
Comments
4 min read
The Silent Threat of Phishing Lures

The Silent Threat of Phishing Lures

Comments
4 min read
🔑 Unmasking Supply Chain Trust Failures

🔑 Unmasking Supply Chain Trust Failures

1
Comments
4 min read
🔑 The Silent Drift in Privilege Escalation

🔑 The Silent Drift in Privilege Escalation

1
Comments
4 min read
💡 The Hidden Cost of Trusting Default Security Po

💡 The Hidden Cost of Trusting Default Security Po

1
Comments
4 min read
🔒 The Shadow of Default Configurations

🔒 The Shadow of Default Configurations

Comments
4 min read
🔒 The Hidden Cost of Dependency Confusion

🔒 The Hidden Cost of Dependency Confusion

1
Comments
4 min read
⚙️ Endpoint Evasion Lessons Learned

⚙️ Endpoint Evasion Lessons Learned

Comments
4 min read
🔎 The Evasion of Simple File Hashing

🔎 The Evasion of Simple File Hashing

1
Comments
4 min read
🔍 The Silent Path to RCE: Exploiting Misconfig

🔍 The Silent Path to RCE: Exploiting Misconfig

1
Comments
4 min read
The Unseen Path in Patching Failures

The Unseen Path in Patching Failures

Comments
4 min read
🔍 RCE in Plain Sight: The Forgotten SMB Relay

🔍 RCE in Plain Sight: The Forgotten SMB Relay

Comments
4 min read
🎯 Hunting In-Memory Shellcode Evasion

🎯 Hunting In-Memory Shellcode Evasion

Comments
5 min read
👻 EDR Evasion: Unhooking the Kernel

👻 EDR Evasion: Unhooking the Kernel

Comments
6 min read
⚙️ AWS STS: Hidden Privilege Escalation

⚙️ AWS STS: Hidden Privilege Escalation

1
Comments
6 min read
💡 LSA Dumps: The EDR Blind Spot

💡 LSA Dumps: The EDR Blind Spot

Comments
5 min read
👻 PowerShell In-Memory Bypass Tactics

👻 PowerShell In-Memory Bypass Tactics

Comments
5 min read
💀 EDR Blind Spots: Kernel Callbacks

💀 EDR Blind Spots: Kernel Callbacks

2
Comments
6 min read
👻 Living Off The Land Evasion

👻 Living Off The Land Evasion

Comments
5 min read
📧 Exchange Evasion: C2 Over MAPI

📧 Exchange Evasion: C2 Over MAPI

Comments
6 min read
🔑 Cloud Policy Abuse: The IAM Blind Spot

🔑 Cloud Policy Abuse: The IAM Blind Spot

Comments
6 min read
🛡️ Cloud Identity Theft: The K8s Blind Spot

🛡️ Cloud Identity Theft: The K8s Blind Spot

Comments
5 min read
🕵️ IMDS Exploitation Blind Spots

🕵️ IMDS Exploitation Blind Spots

Comments
5 min read
🔑 Token Confusion: Cloud Identity Drift

🔑 Token Confusion: Cloud Identity Drift

Comments
5 min read
⚙️ Persistent Threat Via Environment Vars

⚙️ Persistent Threat Via Environment Vars

Comments
6 min read
loading...