Advanced SQL Injection Techniques
Explore cutting-edge SQL injection methods including time-based blind attacks and second-order injection...
Read More →
Cybersecurity professional with expertise in ethical hacking, threat analysis, and digital forensics, aiming to protect systems, detect vulnerabilities, and strengthen organizational security.
I am a cybersecurity professional with expertise in ethical hacking, threat analysis, and digital forensics. My passion lies in protecting systems, detecting vulnerabilities, and strengthening organizational security through comprehensive security assessments and proactive defense strategies.
I hold a BSC in Computer Science and Engineering from Hajee Mohammad Danesh Science & Technology University, Dinajpur. With hands-on experience in vulnerability assessments, penetration testing, and incident response, I am dedicated to creating robust security architectures that safeguard digital assets.
Providing digital customer support, resolving queries efficiently, and ensuring high service quality for Grameenphone users. Managing customer interactions through multiple channels while maintaining professional service standards.
Provided direct service and support to children and women, including handling referrals for child advocacy issues, conducting needs evaluations, addressing women's rights concerns, and resolving complaints with sensitivity and professionalism.
Automates LFI exploitation using predefined payloads with GUI-based interface for simplified testing. Supports fast and accurate payload execution wit...
Performs fast reconnaissance and scanning of web applications. Includes subdomain discovery, URL crawling, and vulnerability detection with organized ...
Comprehensive OSINT gathering tool that automates the collection of intelligence from various public sources. Features social media scanning, email ha...
Explore cutting-edge SQL injection methods including time-based blind attacks and second-order injection...
Read More →Master the basics of Kali Linux, essential commands, and penetration testing tools for cybersecurity...
Read More →Understanding modern XSS attack techniques, including DOM-based XSS and bypassing CSP protection...
Read More →Complete walkthrough of web exploitation challenges including SSRF, XXE, and authentication bypass...
Read More →Explore cutting-edge SQL injection methods including time-based blind attacks and second-order injection...
Read More →Master the basics of Kali Linux, essential commands, and penetration testing tools for cybersecurity...
Read More →Understanding modern XSS attack techniques, including DOM-based XSS and bypassing CSP protection...
Read More →Complete walkthrough of web exploitation challenges including SSRF, XXE, and authentication bypass...
Read More →Nikunja-2, Dhaka-1229