The Human Bootloader: How We Switch Personalities Without a Restart

‼️Note: This is a psychology essay, not a technical manual. It uses the language and metaphors of computing to explore the inner depths of human personality, making complex inner processes easier to grasp through familiar technical imagery. We often describe people as “complicated.” A cleaner metaphor is this: a human is a complex computer—a stack of hardware, firmware, and software—where different layers can take the lead at any moment and determine which version of us shows up in the world. Unlike a machine, however, we don’t need a full reboot to change modes. Our bootloader is always available, letting us pivot in milliseconds from one behavioral profile to another. ...

September 7, 2025 · 4 min

🕷️ One Year of Data Engineering in the Field: A Practical Journey with a Startup Crawler Team

1. A Brief Overview of Crawling and Its Role Crawling refers to the automated process of navigating through web pages to extract targeted data. This data can include product details, prices, descriptions, images, user reviews, and even hidden API endpoints. The ultimate goal is to programmatically access structured data that would otherwise be visible only through manual interaction with a browser. In real-world data pipelines, crawling is just one stage. It is typically followed by scraping (data extraction), parsing (data interpretation), and eventually storage or usage. For startups, crawlers play a vital role—especially in building platforms for price comparison, market intelligence, or competitive analysis. ...

August 3, 2025 · 4 min

Reflected XSS via Magic Words

Overview This report details the discovery and exploitation of a XSS vulnerability identified in the Vulnerability Disclosure Program (VDP) of a target website. Reconnaissance The reconnaissance phase began with the enumeration of subdomains to identify fresh assets that might be unexplored by previous researchers. Initially, I utilized the tool subfinder with the following command: subfinder -d target.com -all -silent | tee target.com.subs Using the -all switch significantly enhanced the enumeration results. To ensure comprehensive coverage, DNS brute-forcing was also executed with shuffleDNS against a wordlist containing approximately 24 million entries: ...

March 24, 2025 · 3 min