Shai-Hulud v2 “Second Coming”: Inside the npm Supply Chain WormSakibul Ali Khan December 3, 2025Research
Django CVE-2025-64459: Critical SQL Injection in the ORM ExplainedSakibul Ali Khan November 20, 2025Research
File Upload Bypass: Understanding and Mitigating Risks in Web ApplicationsSakibul Ali Khan August 31, 2025Web Application Security
How to Find Hidden Messages in JPEGs: A Beginner’s Guide to CTF Steganography Challenges from KUET’s Cyber Security SeminarSakibul Ali Khan August 22, 2025Digital Forensic
Unearthing Secrets in Memory — A Full Write-Up of “Now You See Me” (Shakti CTF 2025)Sakibul Ali Khan August 2, 2025Reverse Engineering
Docker Zero to Hero For Hackers: A Practical Guide for Cybersecurity EnthusiastsSakibul Ali Khan July 26, 2025Cloud Security