Skip to main content

Posts

2024

Misconfiguration Vulnerabilities in Reverse Proxies: A Comprehensive Guide
·976 words·5 mins
Misconfiguration Vulnerabilities in Reverse Proxies: A Comprehensive Guide # Introduction # Reverse proxies are a crucial component in modern web architectures, handling requests between clients and backend servers.
Python Injection
·412 words·2 mins
Telegram Bot with Injection Vulnerability # This project demonstrates a simple Telegram bot implemented in Python using the python-telegram-bot library.

2022

Basic Recon Automation Using Github Actions
·1717 words·9 mins
Currently, the number of companies using CI (Continuous Integration) and CD (Continuous Deploy) solutions to automate the software lifecycle process (SLD) is growing.

2019

Hacktoberfest Owasp
·402 words·2 mins
October is here and everyone is running after their 4 PR’s to win a digitalocean t-shirt!
Getting to Know OWASP
·353 words·2 mins
Open Web Application Security Project # Open Community # OWASP is an open international community dedicated to helping organizations develop, acquire, and operate reliable applications.