Beyond SAST: Building a Multi-LLM Judge for Context-Aware Security AnalysisDuring my years in security engineering, I’ve watched teams struggle with the same problem: drowning in false positives from SAST tools…2d ago2d ago
Runner Up at BPJS Kesehatan Security HackathonMy Expience Winning Indonesia Biggest Security Hackathon!Feb 9, 2022Feb 9, 2022
OSCP Experience — How I Earned 100 Points in 10 HoursHi everyone, today I’m going to tell you my story on how I was able to root all 5 machines in my OSCP Exam and earned 100 points in just…Oct 2, 2021Oct 2, 2021
Remote Code Execution — Bypassing WAF and FiltersInjection is always a thing. Existing and settle well in OWASP Top 10 Security vulnerabilities 2007, 2010, 2013 and 2017 version in which…Nov 8, 2020Nov 8, 2020
Public Password BreachA data breach is the intentional or unintentional release of secure or private/confidential information to an untrusted environment.Apr 10, 2020Apr 10, 2020