Pixel Poisoning: Hacking Generative AI
A fierce visual defense against generative AI — fight back with poisoned pixels, stealthy watermarks, and adversarial trickery.
Read on MediumCybersecurity enthusiast with a strong focus on Network Security and OSINT Research. Skilled in identifying vulnerabilities and applying hands-on solutions, driven to strengthen digital security while expanding expertise through practical projects and certifications.
Cybersecurity enthusiast with a strong focus on Network Security and OSINT Research. Skilled in identifying vulnerabilities and applying hands-on solutions, driven to strengthen digital security while expanding expertise through practical projects and certifications.
Currently pursuing my Diploma in Cybersecurity and ethical hacking, I am constantly expanding my knowledge and skills in the rapidly evolving field of Cybersecurity.
All in One Crypto Solution with a self-developed ShadowHash Algorithm, offering encryption, breach detection, password generation, hash creation, comparison and malware scanning across 28 webpages.
Robust cryptographic key generator built in Java, utilizing PBKDF2, XOR operations, and multi-layered encryption (AES, 3DES, Blowfish) to generate secure, unpredictable keys for encryption.
Adversarial image obfuscation tool that generates ghost images using noise injection, edge distortion, metadata poisoning, and watermarking to prevent unauthorized use in AI training.
A steganography tool enabling users to hide and extract secret messages from images, featuring command-line interface, interactive mode, and lightweight encoding/decoding. Available on PyPI.
Python-based reverse shell for ethical hacking and penetration testing, offering persistence, keylogging, screenshot capture, file transfer, and stealth remote control over compromised systems.
A collection of Bash and PowerShell scripts for automating AWS tasks, including CLI setup, S3, EC2, and DynamoDB management, streamlining cloud operations for Linux and Windows users.
Terraform scripts for deploying Amazon Linux 2023 and Windows Server 2019 instances on AWS, ensuring Free Tier eligibility with automated security groups, key pairs, storage setup, and web server configurations.
In Progress
EC-Council
IEMLabs
IEMLabs
IEMLabs
WEBEL
CloudThat
EC-Council
Completed multiple real-world attack-defense scenarios on TryHackMe and VulnHub, improving skills in penetration testing, network security, and OSINT research.
Regularly practicing in CTF-style challenges and simulated environments to strengthen problem-solving and vulnerability assessment techniques.
Worked with tools like Nmap, Wireshark, Burp Suite, and Metasploit in lab environments to understand vulnerability scanning, traffic analysis, and exploitation basics.
Applied open-source intelligence (OSINT) techniques to gather and analyze information from public sources, strengthening investigative and analytical skills.
Built a strong foundation in network protocols, system security, and vulnerability assessment, applying concepts in simulated lab environments.
A fierce visual defense against generative AI — fight back with poisoned pixels, stealthy watermarks, and adversarial trickery.
Read on Medium
Learn how to exploit SQL injection vulnerabilities using SQLMAP, an automated penetration testing tool for database security assessment.
Read on Medium
A comprehensive guide to hacking and securing Wi-Fi networks using Aircrack-ng, covering practical attack techniques, encryption vulnerabilities, and prevention strategies.
Read on Medium