HackTheBox: Exploiting SUID Binaries for Privilege Escalation
Walkthrough of a medium-difficulty HTB machine involving web enumeration, initial foothold via LFI, and privilege escalation through misconfigured SUID binaries.
I craft scalable web applications and explore the depths of cybersecurity. Passionate about writing clean code and discovering new vulnerabilities.
Engineering
React · Node.js · PostgreSQL · Docker
Research
OWASP · Burp Suite · Metasploit
Community
HackTheBox · TryHackMe · Research

Full-Stack Developer & Security Researcher
Full-Stack Developer and CS student based in Bangladesh. I build web apps that are fast, secure, and maintainable — spanning React, Node.js, FastAPI, and PostgreSQL.
CEH certified with hands-on experience in penetration testing and network security. I bring a security mindset to everything I build.
Building and maintaining full-stack web applications within a GitHub organization. Focused on security-centric architecture, clean component design, and delivering high-performance products collaboratively.
Studying core CS fundamentals with a focus on algorithms, data structures, and network security. Actively applying academic knowledge through a growing portfolio of security tools and web platforms.
Contributing to open-source projects across debugging tools, security utilities, and developer tooling. Focused on code quality, documentation, and building tools that solve real problems.
Self-reflection and habit tracking platform. Built with React and FastAPI, featuring a PostgreSQL backend and a clean, minimal UI focused on daily journaling and progress tracking.
Real-time network traffic visualizer with an interactive dashboard. Uses Scapy for packet capture and WebSockets to stream live data to the React frontend.
Scalable social media application with a focus on performance and clean component architecture. Supports real-time interactions and a responsive feed.
Walkthrough of a medium-difficulty HTB machine involving web enumeration, initial foothold via LFI, and privilege escalation through misconfigured SUID binaries.
A hands-on breakdown of the OWASP Top 10 vulnerabilities with real exploitation examples and code-level mitigations for each.
How to build production-ready FastAPI applications with proper JWT authentication, rate limiting, and input sanitization to prevent common vulnerabilities.
Step-by-step walkthrough of a network-focused CTF challenge involving port scanning, service enumeration, and exploitation with Metasploit.
Latest vulnerability research & CTF solutions
Follow Research on GitHubSend a quick message with your idea and I'll get back to you soon. No clutter, just clear contact info and an easy form.
Contact details
Location
Dhaka, Bangladesh 🇧🇩