[ THREAT LEVEL: MAXIMUM ] — MultiHAT Protocol Active

Sagar Biswas MultiHAT-in-Training Web App Security & Exploitation

I am learning to probe systems, exploit vulnerabilities, and dismantle weak defenses. CSE student at AIUB — building offensive capabilities in web app security, penetration testing, and cyber operations under the MultiHAT protocol.

// The real mission: secure systems through understanding the attacker's mindset.


AIUB CSE Operative
Active Noob → Skilled
Web App Attack Surface

Identity File

Computer Science operative embedded at AIUB. Intersted in web application exploitation, penetration testing, and offensive security research. The MultiHAT protocol demands mastery of both attack and defense vectors.

Handle SagarBiswas-MultiHAT
Status STUDENT OPERATOR
Affiliation AIUB — CSE (Undergraduate)
Location Bangladesh // Dhaka
Focus Web App Security + Dev
Ethics WHITEHAT ✔
Education → SSC: Ideal School & College
→ HSC: Habibullah Bahar College
→ Undergraduate: AIUB
Channel @Sagar-MultiHAT
Email eng.sagar.aiub@gmail.com

// Offense

Git & GitHub
88%
Burp Suite
55%
OWASP ZAP
58%
Metasploit
52%
Nmap / Recon
85%
OSINT
82%
Exploit Dev
92%

// Defense

Python Sec
90%
Secure Web Dev
95%
Bash Auto
77%
Networking
90%
SOC Basics
50%
C & C++
82%
Cybersecurity Basics
98%

root@multihat:~# whoami

SAGAR BISWAS

root@multihat:~# cat /etc/mission

infiltrate. exploit. secure.

root@multihat:~# systemctl status threat-level

● active (running) — MAXIMUM THREAT

Attack Vectors & Arsenal

Operational capabilities and weapons in the MultiHAT toolkit.

// Public Reports

Explore my public security reports and findings.

ReserveX Security Public Report

I just did my first security assessment of reservexbd.com. I only performed passive recon, which means I did not run active scans or exploit anything. Below is a clear, student-style bullet summary that contains everything from the public report.

- Overview: 15 security issues found in total; 2 of them are critical.
- RXBD-001 (critical): DNS leaks the real server IP behind Cloudflare. Attackers can bypass Cloudflare protections (firewall, DDoS protection, rate limits) and talk directly to the origin server, which makes all other issues much worse.
- RXBD-002 (critical): The media storage bucket is publicly accessible. File paths are present in the page HTML, so anyone can download stored media such as restaurant photos and possibly user uploads.
- RXBD-003: Open redirect on the login page via the unvalidated ?next= parameter. This can be abused for phishing by sending users to a malicious site after login.
- RXBD-004: Signup OTP has no visible rate limiting. Four or six digit OTPs are brute-forceable without an account lockout or throttling.
- RXBD-005: Login error messages reveal account existence by returning different messages for wrong password versus account not found. This enables phone number enumeration.
- RXBD-006: Missing important security headers such as Content Security Policy (CSP), HSTS, and X-Frame-Options, increasing risk of clickjacking, mixed content, and other attacks.
- RXBD-007: Payment iframe for bKash and Nagad fails to load on restaurant pages. Likely a CSP misconfiguration is blocking the provider, causing users to be unable to pay and resulting in immediate revenue loss until fixed.
- RXBD-008: Potential authorization issue with bookings that use simple numeric IDs (for example, /bookings/1234/). If ownership checks are missing, a logged-in user could view or cancel others' bookings. I could not verify this with authenticated testing, so it remains a possible but common mistake.
- RXBD-009: Contact form lacks CAPTCHA, increasing spam and automated abuse risk.
- RXBD-010: Django admin is exposed at the default /admin/ path and is frequently probed by bots, increasing the attack surface.
- RXBD-011: No robots.txt is present, so search engines may index sensitive paths unintentionally.
- RXBD-012: Email addresses are obfuscated with a trivial XOR scheme in the HTML; this can be decoded in seconds and offers no real protection.
- RXBD-013: No sitemap.xml is provided.
- RXBD-014: Password reset OTP lacks visible rate limiting as well, mirroring RXBD-004 and allowing brute force of reset codes.
- RXBD-015: Registration does not verify email ownership, so someone can sign up with another person's email and cause that person to receive booking notifications without consent.

- Chain risk: These findings can chain together. For example, find the real server IP (RXBD-001), bypass Cloudflare, brute force OTPs (RXBD-004/RXBD-014), take over accounts using enumeration (RXBD-005), and then view or cancel bookings (RXBD-008) or steal deposits. Each step in the chain is supported by findings in the report.
- What worked: HTTPS is active, Cloudflare is configured (but bypassable by RXBD-001), phone OTP is implemented for registration, and payment gateways use authorized providers.
- Report status: I prepared a full sanitized report with CVSS scores, evidence, and remediation steps for all 15 findings. The private report containing exact hostnames and paths was delivered to the ReserveX team. This public version redacts sensitive technical details.

If you do security research or web development, I would appreciate any feedback or suggestions.


View: ReserveX_Security_Report_Public(Google Drive)
Security Web App Recon Django

Exploitation Toolkit

  • Web exploitation: XSS, SQLi, CSRF, SSRF
  • Tooling: Burp Suite, OWASP ZAP, Metasploit
  • Network recon: Wireshark, Nmap, DNS enum

Weaponized Stack

  • HTML, CSS, JavaScript, PHP, React
  • Python, C, C++, C#, Java, Bash, Arduino
  • Databases: MySQL, PostgreSQL, MongoDB

Intel & Operations

Python C C++ C# Java Bash Script Arduino Script Ducky Script HTML CSS JavaScript PHP React MySQL PostgreSQL MongoDB Burp Suite OWASP ZAP Metasploit Wireshark Nmap Git & GitHub Linux Windows Android Networking HTTP/HTTPS DNS TCP/IP OSINT SOC Fundamentals XSS SQL Injection CSRF

Classified Operations

Active exploits, research projects, and weaponized tools from the MultiHAT arsenal.

Cybersecurity Notebook Vault (6)

Practical Cybersecurity Notebook Vault; A curated collection of PDF notebooks and hands-on guides covering networking, DNS, Google Dorks/OSINT, phishing, SOC workflows, red/blue fundamentals, and career paths. Built for beginners→intermediate learners with direct PDF links, study roadmap, example commands, and a GitHub Pages site for easy browsing

→ Live: CYBERSECURITY NOTEBOOK VAULT
OSINT NETWORKING G DORKING PHISHING CAREER PATHS

Foundations of Networking Notebook (1)

A beginner-friendly guide to networking fundamentals, breaking down how the internet really works. Covers TCP vs UDP, IP addressing, DNS, OSI & TCP/IP models, IPv4 vs IPv6, and Wi-Fi security basics. Perfect for students and tech enthusiasts building strong networking foundations.

→ View: Networking Notebook
Networking Beginner

Python A to Z & The Practical Hacker's Handbooks (2)

Python Notebooks; two companion notebooks: "The Pythonic Odyssey" (core Python: basics → OOP, file I/O, virtualenvs, advanced patterns) and "Python for CyberSecurity" (security tooling + hands-on projects). Includes practical projects (MAC changer, Netcat automation, multi-mode Nmap scanner, educational keylogger, etc).

→ Live: Python 2 Handbooks
Python Cybersecurity Intermediate

Ultimate Bash Script Handbook (1)

Student-written, step-by-step Bash scripting notebook with 21 lessons: from “Hello World” to real automation projects, exercises, and a compact reference. Learn common patterns, safe scripting, and practical scripts you can run and reuse. Perfect for beginners and quick reference.

→ View: Bash Script Handbook
Live: Bash Script Handbook
Bash Linux Automation

C, DS & Libraries Notebook (2 + 2)

Curated C & C++ study hub — annotated PDFs, header-file references, seven runnable projects, and guided notebooks. Includes a dark GitHub Pages site with client-side search. Learn systems-level C/C++ via worked examples, reference headers, and project walkthroughs.

Live: C, , C++ DS & Libraries Notebook
C C++ DSA Libraries

JavaScript Notebooks (6)

A curated, GitHub-Pages ready learning hub of six PDF notebooks (128 pages) that guide beginners to modern ES6+. Searchable catalog with filters, direct open/download links, clear learning path, DOM/BOM/storage examples, best-practices and automated repo validation; perfect for learners and portfolio showcase.

→ Live: JavaScript 6 Notebooks
JavaScript Web Dev Beginner

Git & GitHub Notebooks

Beginner-friendly Git & GitHub notebook series: step-by-step PDF lessons with practical terminal examples covering setup, SSH keys, commits, branching, merging, conflict resolution, PRs, issues, and open-source contribution workflows. Use it as a hands-on roadmap from zero→confident collaborator.

→ Live: Git & GitHub Notebooks
Git GitHub Beginner

PHP Fundamentals Notebook (7)

Curated PHP learning library with 7 PDF notebooks covering fundamentals, form validation, sessions and cookies, file and XML handling, MySQL with PDO, MVC, and AJAX/JSON, plus companion projects and a GitHub Pages site that makes the full learning path easy to explore.

→ Live: PHP 7 Notebooks
PHP Web Dev Beginner

React Fundamentals Notebook (3)

A complete React learning vault: three PDF volumes and hands-on guides covering setup (Vite & CRA), JSX, components, hooks, state management, forms, mapping, and a full Todo app. Includes assignments, a step-by-step roadmap from beginner→project, and a GitHub Pages site (Actions-ready) for easy browsing.

→ Live: React 3 Notebooks
React Web Dev Beginner

NestJS Notebooks (1)[Continuous]

Hands-on NestJS Notebook; a beginner-to-intermediate, example-driven guide covering NestJS fundamentals, architecture, dependency injection, controllers, services, modules, and a full Student CRUD REST API with Postman tests. Includes practical explanations, code snippets, and interview questions to build production-ready backends.

→ Visit: NestJS Notebooks
NestJS Web Dev Beginner

NOTE: To find more notebooks, projects, tips and tricks like this, join my Facebook community group and check the featured section for notebooks and explore the Posts to discover real-world projects.

Educational use only: The tools and notebooks listed here are for learning, research, and defensive purposes only. Do not use them for malicious activity. Contact me for responsible disclosure or questions.

Projects

Web Vulnerability Scanner + Ai Support

PoliteWebScanner is a learning-grade web vulnerability scanner plus AI-assisted report viewer. It crawls safely (queue-based, robots-aware, rate-limited), detects common issues (security headers, cookie flags, reflected XSS heuristics, SQL error patterns), and exports human-friendly JSON/HTML reports with optional AI help for triage and remediation

View repo: Web Vulnerability Scanner Tooling + CyberSecurity Assistant

BlackHAT AI-Assistant

A local Python desktop assistant (Tkinter) that runs Groq AI queries, maps natural commands to quick web actions (Google, YouTube, GitHub), and persists session history. Lightweight, customizable GUI, easy to extend with new shortcuts and offline session recall for fast personal workflows.

View repo: BlackHAT AI-Assistant CyberSecurity

SharpLink URL 2-Allies

A clean Flask-based URL shortener that converts long links into short, shareable URLs with optional custom aliases, expiration support, and TinyURL mirroring. Uses SQLite for persistence, includes copy helpers, rate limiting, and a simple REST API. Ideal for learning backend fundamentals and deployment.

View repo: SharpLink URL Shortener Web Dev

Email Scraper

A clean Flask-based URL shortener that converts long links into short, shareable URLs with optional custom aliases, expiration support, and TinyURL mirroring. Uses SQLite for persistence, includes copy helpers, rate limiting, and a simple REST API. Ideal for learning backend fundamentals and deployment.

View repo: Scraper Web Dev

A_Pythonic-Keylogger

Python-based keylogger for ethical use, capturing keystrokes and emailing logs. Features include retry logic for email delivery, log file management, and cross-platform support (Windows/Linux). Configurable for auto-start via systemd or Startup folder. Designed for educational purposes, penetration testing with consent, and self-monitoring.

View repo: A Pythonic Keylogger CyberSecurity

Spech_to_Spech_AI-Assistant

This Python script creates a voice-controlled virtual assistant using speech recognition, AI responses, and text-to-speech conversion. It listens for commands like opening websites or playing music, processes them using AI, and responds via speech. Powered by Google's Speech Recognition, Groq API, and pyttsx3 for voice interaction.

View repo: Speech-to-Speech AI Assistant AI

WebSource Harvester

WebSource Harvester is an educational web-source harvester that crawls a site (BFS, depth-controlled), downloads browser-visible assets (HTML, CSS, JS, images, fonts, PDFs), and rewrites paths so pages work offline, including nested routes. It enforces same-origin limits and is designed for learning, offline analysis, and safe portfolio demos.

View repo: WebSource Harvester WebTech

My more works

NoteBooks AND Facebook Community Group


noteBooks-maintainingBYme

- NOTE: To find more notebooks, projects, tips and tricks like this, join my Facebook community group and check the featured section for notebooks and explore the Posts to discover real-world projects.
AIUB CyberSecurity & Programming Society


Useful Repositories


Web_Penetration_Testing_Roadmap infosec-vocabulary Cybersecurity-Library WSL-Installation_Guide


AI Based Projects


Speech2Speech-AIAssistant Ai-Resume-Analyzer Ai-Phishy-Playground Chat-Automation-Bot_Ai-Assistant Cyber-Command_AI-Assistant.exe


Tools/Automation


MacChanger-V1-MAX Phoneint-OSINT-Toolkit HashAttackDemos BruteforceLab1 BruteforceLab2 EmailBomber NmapScanningTool-V1-MAX WinTempCleaner WiFi-Dictionary-Attack SeleniumFirefoxGoogleSearchAutomation TextBombing-Toolkit


Networking


TCP-Playground Saved-WiFi-Restore WiFi-QR-Generator domain2ip


Development


Photo-PDF-Bidirectional-Converter AirportDesk-Assistant Library-Management-System Multi-FA-Auth PyTextEditor SafeTodoManager SecurePay_E-Wallet-V1 Student-Management-MVC-Learning-Project TicTacToe-Game SecureBank-CLI SecureBankingSystem CustomerSlip-CLI PyCalculator Contact-Management-System SnakeWaterGun-Game PyAlarmClock AirportDesk-Assistant Fake_FACEBOOK_Login_Page


Small Projects


Password-Strength-Checker XSS-WebGuard Port_Scanner-Python RandomPasswordGeneratorCpp virusNewFolder


Collected Projects


Impress-Crush-CPP-ASCII


Featured YouTube video thumbnail

Surveillance Feed

MultiHAT Broadcast

Intercepted transmissions from the YouTube channel.

Watch on YouTube

Intercepted Transmissions

Threat intelligence, attack analysis, and leaked security research.

Transmission Archive
Why attackers use the temp folder and how to protect your PC

February 25, 2026 · Windows Security

Why Attackers Like the Temp Folder and How You Can Protect Your PC

A practical breakdown of how malware stages files in Temp, why that folder is often abused, and what habits reduce your risk quickly.

Read the blog: Temp folder security
OSI model layers mapped to real attack categories

February 24, 2026 · Network Security Basics

Understanding OSI Layers Through Real Attack Examples

A layer-by-layer attack map that turns OSI theory into practical security understanding.

Read the blog: OSI layers and attacks
WSL2 Kali Linux Win-KeX installation guide cover

January 17, 2026 · WSL2 & Kali Linux

WSL2 + Kali Linux + Win-KeX (GUI) Installation Guide (Beginner-Friendly)

A notebook-style guide with exact commands, recommended prompt answers, screenshots, and fixes. Perfect for a clean Windows + WSL2 + Kali GUI setup.

Read the blog: WSL2 + Kali Linux + Win-KeX
Full-page screenshot using DevTools

January 17, 2026 · Web Tips

Easiest Way to Take a FULL-PAGE Screenshot Using Inspect! 📸

Open DevTools, use the Command Menu, and capture a full-size screenshot in seconds. No extensions needed.

Read the blog: Full-page screenshot using Inspect
A printer displays a warning about a compromised network

January 17, 2026 · Security Awareness

🧨 Fun Fact: A Cyberattack That Can Start With… a Printer 🖨️

Printers are often ignored, under-patched, and trusted by everything inside a network. This post breaks down how a printer became the quiet entry point for attackers — and what you can do to stop it.

Read the blog: Printer attack entry point
Vibe coding and tech debt illustration

January 17, 2026 · Engineering Culture

Vibe Coding মানে দ্রুত কাজের আড়ালে ধীরে ধীরে টেক ডেবট জমা করা

AI দিয়ে দ্রুত ডেলিভারি সম্ভব, কিন্তু ভুল সিদ্ধান্তে তৈরি হয় বাড়তি জটিলতা। এই লেখায় আছে সহজ ব্যাখ্যা — কোথায় স্পিড দরকার, আর কোথায় সরলতা দরকার।

Read the blog: Vibe coding & tech debt
Anonymity and privacy illustration

January 17, 2026 · Privacy & OpSec

Complete, Forever Anonymity Doesn't Exist — Here's What Actually Works

Nation-state actors can correlate metadata and behavior. VPNs and proxies help, but real anonymity depends on identity separation, fewer actions, and avoiding linking accounts.

Read the blog: Anonymity & OpSec
Wi-Fi security alert illustration

January 17, 2026 · Network Safety

Wi‑Fi Security Alert: MAC Blocking Isn’t Enough — What to Do Instead

Blocking by MAC can be bypassed on modern phones. The safest fix is a password change plus tighter router settings.

Read the blog: Wi-Fi security alert
Quantum cryptography and encryption illustration

January 18, 2026 · Cryptography & Future Security

Why Quantum Computers Will Break Your Encryption (And Why We're Ready)

Quantum computers threaten current RSA and ECC encryption. NIST's post-quantum standards exist today. Learn what organizations should do now.

Read the blog: Quantum cryptography

Clearance Documents

Verified credentials and operational certifications.

Dossier

Classified personnel file. Handle with caution.

Intel Sources

Surveillance feeds, training grounds, and underground networks.

YouTube: MultiHAT Featured

Watch my featured video on YouTube for updates and walkthroughs.

Watch video

AIUB CyberSecurity & Programming Society

Another featured focused on security learning and tooling.

Visit the community

Labs & Learning

PortSwigger, OWASP Top 10, TryHackMe, and Hack The Box.

Explore labs

Establish Contact

Encrypted channels only. Unsolicited access attempts will be logged.

Direct


Email: eng.sagar.aiub@gmail.com

Facebook

Availability


Bangladesh · Remote collaboration

Currently focused on learning and open-source


// Real talk: responsible disclosure only. Security issues? Report directly to eng.sagar.aiub@gmail.com. This site promotes cybersecurity awareness.