Posts
2024
eBPF in Action
·554 words·3 mins
Atention!
Threat Modeling Intro
·2474 words·12 mins
Introduction # Threat Modeling is an essential practice for teams looking to identify and mitigate threats and vulnerabilities in their systems.
Misconfiguration Vulnerabilities in Reverse Proxies: A Comprehensive Guide
·976 words·5 mins
Misconfiguration Vulnerabilities in Reverse Proxies: A Comprehensive Guide # Introduction # Reverse proxies are a crucial component in modern web architectures, handling requests between clients and backend servers.
Python Injection
·412 words·2 mins
Telegram Bot with Injection Vulnerability # This project demonstrates a simple Telegram bot implemented in Python using the python-telegram-bot library.
2022
Basic Recon Automation Using Github Actions
·1717 words·9 mins
Currently, the number of companies using CI (Continuous Integration) and CD (Continuous Deploy) solutions to automate the software lifecycle process (SLD) is growing.
2019
Hacktoberfest Owasp
·402 words·2 mins
October is here and everyone is running after their 4 PR’s to win a digitalocean t-shirt!
Getting to Know OWASP
·353 words·2 mins
Open Web Application Security Project # Open Community # OWASP is an open international community dedicated to helping organizations develop, acquire, and operate reliable applications.