Backdooring iPhones using possibly the most advanced exploit ever
Read MorePrimarily focus on tech-driven solutions related to public infrastructure, cybersecurity, digital rights, and automation. Most of my projects aim to solve real-world problems using open data, APIs, and scalable web technologies.
Many of them are, yes. Whenever possible, I release code, documentation, or datasets under open licenses so others can learn from, build upon, or improve the work.
You can contribute in several ways:
Submitting pull requests or suggestions (if code is public).
Reporting bugs or sharing feedback.
Collaborating on research or technical writing.
Reaching out for joint initiatives or ideas.
Absolutely. I’m always open to new ideas, especially if they’re aligned with social impact, technology, and open innovation. Just drop me a message through the contact form or email.
I occasionally publish research papers, technical blogs, and experiments on this site and GitHub. Kindly check the navigation menu.
Backdooring iPhones using possibly the most advanced exploit ever
Read MoreUncover how the ‘Dance of the Hillary’ malware hoax spread across India, tricked law enforcement, and what it reveals about cybersecurity and disinformation warfare.
Read MoreWhat started as a small CTF team in a university classroom in Greater Noida has now grown into a nationwide movement. Hackorn – The Berserk isn’t just about hacking competitions; it’s about building ethical warriors, teaching life skills, and giving back to society. From ranking in CTFs to running roadside Rasna drives, discover how one team is redefining cybersecurity education in India—and how you can be a part of it.
Read Morereceice latest news, updates, and many other things every week.
Cyber security is no longer just a technical issue—it's a fundamental part of our everyday lives. As the digital world continues to expand, so do the threats that challenge our privacy and safety. Protecting data is not a one-time action but an ongoing commitment to staying ahead of potential risks. In this rapidly evolving landscape, the true power lies in awareness, constant vigilance, and the ability to adapt. A secure digital future is built on the foundation of both technology and informed decisions.
Copyright © 2025 SecPen Labs - All Rights Reserved