Akshat

A fervent Penetration Tester , innovative App Developer, imaginative writer, and dedicated Software Developer

As a committed professional proficient in penetration testing, app development, creative writing, and software engineering, I am driven by a fervent passion for innovation and the art of storytelling. My work seamlessly integrates cybersecurity expertise with creative flair, producing compelling projects that inspire imagination and captivate audiences.

Penetration Testing

Continuously elevating my expertise within cybersecurity domain.

Developer

Relentlessly uncovering and refining unexpectedly simplified solutions.

UI/UX Designing

A seemingly minor skill with profound significance.

Writing

Exemplary conversation speaks louder than any code.

Latest & Greatest

Writing {March 06, 2024}

Fuzzing

Fuzzing, in essence, is an automated testing technique that bombards a program with random or unexpected inputs to uncover vulnerabilities. It aims to expose bugs that may go unnoticed in traditional testing methods.

View Blog

Short Project {February 27, 2024}

C2CFG

c2CFG is an innovative tool designed to assist
programmers in understanding the control flow
structure of C code. Named after its primary function,
which is to convert C code into its corresponding
Control Flow Graph (CFG).

View Project

Writing {February 25, 2024}

Linux Memory Model

The "Memory Model of Linux" refers to how the Linux operating system manages and utilizes memory within a computer system. It includes mechanisms for memory allocation, deallocation, and protection, as well as how the kernel and user-space applications interact with the system's memory.

View Blog

Writing {February 19, 2024}

Race Conditions

A race condition vulnerability is a type of software flaw that occurs when the behavior of a program depends on the sequence or timing of uncontrollable events. In essence, it arises when the correctness of a program depends not only on the order of execution of its instructions but also on the timing of those executions.

View Blog