[ THREAT LEVEL: MAXIMUM ] — MultiHAT Protocol Active

Sagar Biswas MultiHAT-in-Training Web App Security & Exploitation

I am learning to probe systems, exploit vulnerabilities, and dismantle weak defenses. CSE student at AIUB — building offensive capabilities in web app security, penetration testing, and cyber operations under the MultiHAT protocol.

// The real mission: secure systems through understanding the attacker's mindset.


AIUB CSE Operative
Active Noob → Skilled
Web App Attack Surface

Identity File

Computer Science operative embedded at AIUB. Intersted in web application exploitation, penetration testing, and offensive security research. The MultiHAT protocol demands mastery of both attack and defense vectors.

Handle SagarBiswas-MultiHAT
Status STUDENT OPERATOR
Affiliation AIUB — CSE (Undergraduate)
Location Bangladesh // Dhaka
Focus Web App Security + Dev
Ethics WHITEHAT ✔
Education SSC: Ideal School & College → HSC: Habibullah Bahar College
→ Undergraduate: AIUB
Channel @Sagar-MultiHAT
Email eng.sagar.aiub@gmail.com

// Offense

Git & GitHub
88%
Burp Suite
55%
OWASP ZAP
58%
Metasploit
52%
Nmap / Recon
85%
OSINT
82%
Exploit Dev
92%

// Defense

Python Sec
90%
Secure Web Dev
95%
Bash Auto
77%
Networking
90%
SOC Basics
50%
C & C++
82%
Cybersecurity Basics
98%

root@multihat:~# whoami

SAGAR BISWAS

root@multihat:~# cat /etc/mission

infiltrate. exploit. secure.

root@multihat:~# systemctl status threat-level

● active (running) — MAXIMUM THREAT

Attack Vectors & Arsenal

Operational capabilities and weapons in the MultiHAT toolkit.

Exploitation Toolkit

  • Web exploitation: XSS, SQLi, CSRF, SSRF
  • Tooling: Burp Suite, OWASP ZAP, Metasploit
  • Network recon: Wireshark, Nmap, DNS enum

Weaponized Stack

  • HTML, CSS, JavaScript, PHP, React
  • Python, C, C++, C#, Java, Bash, Arduino
  • Databases: MySQL, PostgreSQL, MongoDB

Intel & Operations

Python C C++ C# Java Bash Script Arduino Script Ducky Script HTML CSS JavaScript PHP React MySQL PostgreSQL MongoDB Burp Suite OWASP ZAP Metasploit Wireshark Nmap Git & GitHub Linux Windows Android Networking HTTP/HTTPS DNS TCP/IP OSINT SOC Fundamentals XSS SQL Injection CSRF

Classified Operations

Active exploits, research projects, and weaponized tools from the MultiHAT arsenal.

Foundations of Networking Notebook

A beginner-friendly guide to networking fundamentals, breaking down how the internet really works. Covers TCP vs UDP, IP addressing, DNS, OSI & TCP/IP models, IPv4 vs IPv6, and Wi-Fi security basics. Perfect for students and tech enthusiasts building strong networking foundations.

View: Networking Notebook (AIUB Cybersecurity & Programming Society) Notebook

Ultimate Bash Script Handbook

From my first echo "Hello World" to real-world automation, this Bash Scripting Handbook documents my complete learning journey—covering core concepts, scripting logic, debugging, security, and practical projects. A hands-on roadmap for mastering Bash and Linux automation. 🐧⚙️

View: Bash Script Handbook (AIUB Cybersecurity & Programming Society) Notebook

NOTE: To find more notebooks, projects, tips and tricks like this, join my Facebook community group and check the featured section for notebooks and explore the Posts to discover real-world projects.

Educational use only: The tools and notebooks listed here are for learning, research, and defensive purposes only. Do not use them for malicious activity. Contact me for responsible disclosure or questions.

Projects

Web Vulnerability Scanner + Ai Support

PoliteWebScanner is a learning-grade web vulnerability scanner plus AI-assisted report viewer. It crawls safely (queue-based, robots-aware, rate-limited), detects common issues (security headers, cookie flags, reflected XSS heuristics, SQL error patterns), and exports human-friendly JSON/HTML reports with optional AI help for triage and remediation

View repo: Web Vulnerability Scanner Tooling + CyberSecurity Assistant

A Pythonic Hackathon

Sagar is a Python-based command-line virtual assistant for CSE students and cybersecurity learners. It supports single-line and multi-line commands to open trusted websites, play curated music links, and answer questions using an AI model—designed for safe automation, learning, and terminal-first exploration.

View repo: A Pythonic Hackathon CyberSecurity Assistant

SharpLink URL 2-Allies

A clean Flask-based URL shortener that converts long links into short, shareable URLs with optional custom aliases, expiration support, and TinyURL mirroring. Uses SQLite for persistence, includes copy helpers, rate limiting, and a simple REST API. Ideal for learning backend fundamentals and deployment.

View repo: SharpLink URL Shortener Web Dev

Email Scraper

A clean Flask-based URL shortener that converts long links into short, shareable URLs with optional custom aliases, expiration support, and TinyURL mirroring. Uses SQLite for persistence, includes copy helpers, rate limiting, and a simple REST API. Ideal for learning backend fundamentals and deployment.

View repo: Scraper Web Dev

A_Pythonic-Keylogger

Python-based keylogger for ethical use, capturing keystrokes and emailing logs. Features include retry logic for email delivery, log file management, and cross-platform support (Windows/Linux). Configurable for auto-start via systemd or Startup folder. Designed for educational purposes, penetration testing with consent, and self-monitoring.

View repo: A Pythonic Keylogger CyberSecurity

Spech_to_Spech_AI-Assistant

This Python script creates a voice-controlled virtual assistant using speech recognition, AI responses, and text-to-speech conversion. It listens for commands like opening websites or playing music, processes them using AI, and responds via speech. Powered by Google’s Speech Recognition, Groq API, and pyttsx3 for voice interaction.

View repo: Speech-to-Speech AI Assistant AI

WebSource Harvester

WebSource Harvester is an educational web-source harvester that crawls a site (BFS, depth-controlled), downloads browser-visible assets (HTML, CSS, JS, images, fonts, PDFs), and rewrites paths so pages work offline, including nested routes. It enforces same-origin limits and is designed for learning, offline analysis, and safe portfolio demos.

View repo: WebSource Harvester WebTech

My more works

NoteBooks AND Facebook Community Group


Google_Dorks_Notebook noteBooks-maintainingBYme

- NOTE: To find more notebooks, projects, tips and tricks like this, join my Facebook community group and check the featured section for notebooks and explore the Posts to discover real-world projects.
AIUB CyberSecurity & Programming Society


Useful Repositories


Web_Penetration_Testing_Roadmap infosec-vocabulary Cybersecurity-Library WSL-Installation_Guide


AI Based Projects


Speech2Speech-AIAssistant Ai-Resume-Analyzer Ai-Phishy-Playground Chat-Automation-Bot_Ai-Assistant Cyber-Command_AI-Assistant.exe


Tools/Automation


MacChanger-V1-MAX Phoneint-OSINT-Toolkit HashAttackDemos BruteforceLab1 BruteforceLab2 EmailBomber NmapScanningTool-V1-MAX WinTempCleaner WiFi-Dictionary-Attack SeleniumFirefoxGoogleSearchAutomation TextBombing-Toolkit


Networking


TCP-Playground Saved-WiFi-Restore WiFi-QR-Generator domain2ip


Development


Photo-PDF-Bidirectional-Converter AirportDesk-Assistant Library-Management-System Multi-FA-Auth PyTextEditor SafeTodoManager SecurePay_E-Wallet-V1 Student-Management-MVC-Learning-Project TicTacToe-Game SecureBank-CLI SecureBankingSystem CustomerSlip-CLI PyCalculator Contact-Management-System SnakeWaterGun-Game PyAlarmClock AirportDesk-Assistant Fake_FACEBOOK_Login_Page


Small Projects


Password-Strength-Checker XSS-WebGuard Port_Scanner-Python RandomPasswordGeneratorCpp virusNewFolder


Collected Projects


Impress-Crush-CPP-ASCII


Featured YouTube video thumbnail

Surveillance Feed

MultiHAT Broadcast

Intercepted transmissions from the YouTube channel.

Watch on YouTube

Intercepted Transmissions

Threat intelligence, attack analysis, and leaked security research.

Transmission Archive
Why attackers use the temp folder and how to protect your PC

February 25, 2026 · Windows Security

Why Attackers Like the Temp Folder and How You Can Protect Your PC

A practical breakdown of how malware stages files in Temp, why that folder is often abused, and what habits reduce your risk quickly.

Read the blog: Temp folder security
OSI model layers mapped to real attack categories

February 24, 2026 · Network Security Basics

Understanding OSI Layers Through Real Attack Examples

A layer-by-layer attack map that turns OSI theory into practical security understanding.

Read the blog: OSI layers and attacks
WSL2 Kali Linux Win-KeX installation guide cover

January 17, 2026 · WSL2 & Kali Linux

WSL2 + Kali Linux + Win‑KeX (GUI) Installation Guide (Beginner‑Friendly)

A notebook‑style guide with exact commands, recommended prompt answers, screenshots, and fixes. Perfect for a clean Windows + WSL2 + Kali GUI setup.

Read the blog: WSL2 + Kali Linux + Win‑KeX
Full-page screenshot using DevTools

January 17, 2026 · Web Tips

Easiest Way to Take a FULL-PAGE Screenshot Using Inspect! 📸

Open DevTools, use the Command Menu, and capture a full‑size screenshot in seconds. No extensions needed.

Read the blog: Full-page screenshot using Inspect
A printer displays a warning about a compromised network

January 17, 2026 · Security Awareness

🧨 Fun Fact: A Cyberattack That Can Start With… a Printer 🖨️

Printers are often ignored, under-patched, and trusted by everything inside a network. This post breaks down how a printer became the quiet entry point for attackers — and what you can do to stop it.

Read the blog: Printer attack entry point
Vibe coding and tech debt illustration

January 17, 2026 · Engineering Culture

Vibe Coding মানে দ্রুত কাজের আড়ালে ধীরে ধীরে টেক ডেবট জমা করা

AI দিয়ে দ্রুত ডেলিভারি সম্ভব, কিন্তু ভুল সিদ্ধান্তে তৈরি হয় বাড়তি জটিলতা। এই লেখায় আছে সহজ ব্যাখ্যা — কোথায় স্পিড দরকার, আর কোথায় সরলতা দরকার।

Read the blog: Vibe coding & tech debt
Anonymity and privacy illustration

January 17, 2026 · Privacy & OpSec

Complete, Forever Anonymity Doesn't Exist — Here's What Actually Works

Nation-state actors can correlate metadata and behavior. VPNs and proxies help, but real anonymity depends on identity separation, fewer actions, and avoiding linking accounts.

Read the blog: Anonymity & OpSec
Wi-Fi security alert illustration

January 17, 2026 · Network Safety

Wi‑Fi Security Alert: MAC Blocking Isn’t Enough — What to Do Instead

Blocking by MAC can be bypassed on modern phones. The safest fix is a password change plus tighter router settings.

Read the blog: Wi-Fi security alert
Quantum cryptography and encryption illustration

January 18, 2026 · Cryptography & Future Security

Why Quantum Computers Will Break Your Encryption (And Why We're Ready)

Quantum computers threaten current RSA and ECC encryption. NIST's post-quantum standards exist today. Learn what organizations should do now.

Read the blog: Quantum cryptography

Clearance Documents

Verified credentials and operational certifications.

Dossier

Classified personnel file. Handle with caution.

Intel Sources

Surveillance feeds, training grounds, and underground networks.

YouTube: MultiHAT Featured

Watch my featured video on YouTube for updates and walkthroughs.

Watch video

AIUB CyberSecurity & Programming Society

Another featured focused on security learning and tooling.

Visit the community

Labs & Learning

PortSwigger, OWASP Top 10, TryHackMe, and Hack The Box.

Explore labs

Establish Contact

Encrypted channels only. Unsolicited access attempts will be logged.

Direct


Email: eng.sagar.aiub@gmail.com

Phone: +880 1727 361077

Facebook

Availability


Bangladesh · Remote collaboration

Currently focused on learning and open-source

// Real talk: responsible disclosure only. Security issues? Report directly to eng.sagar.aiub@gmail.com. This site promotes cybersecurity awareness.