Mihir ShahStock Manipulation By Exploiting Serverless Cloud ServicesIn this article, we will be trying to understand an infamous exploitation technique and how attackers can make companies potentially incur…10 min read·Jan 30, 2023----
Mihir ShahEvolution of Return Oriented ProgrammingUnderstanding the core and depths of Return Oriented Programming16 min read·Jan 22, 2021----
Mihir ShahGaining SYSTEM in any Windows boxAs enticing as the topic of today’s article is, we will be understanding the underlying concepts of how one becomes NT AUTHORITY/SYSTEM by…5 min read·Jul 25, 2019----
Mihir ShahScanning vulnerable Docker imagesTalking about red teaming and scanning images for vulnerabilities inside a containerized environment is a very tedious task at hand. Lets…4 min read·Jul 21, 2019--1--1