Skip to main content

Posts

2024

Misconfiguration Vulnerabilities in Reverse Proxies: A Comprehensive Guide
·976 words·5 mins
Misconfiguration Vulnerabilities in Reverse Proxies: A Comprehensive Guide # Introduction # Reverse proxies are a crucial component in modern web architectures, handling requests between clients and backend servers.
Proxmox and Homelab: How I Transformed a Mini PC into a Respectable Server
·561 words·3 mins
Recently, I had the opportunity to present at Debian Day Natal 2024, where I shared my journey of transforming a mini PC, purchased from AliExpress, into a complete homelab server.
Python Injection
·412 words·2 mins
Telegram Bot with Injection Vulnerability # This project demonstrates a simple Telegram bot implemented in Python using the python-telegram-bot library.

2023

Threat Modeling Mermaid
·220 words·2 mins
Example of Dataflow for Threat Modeling using Mermaid.

2022

Basic Recon Automation Using Github Actions
·1717 words·9 mins
Currently, the number of companies using CI (Continuous Integration) and CD (Continuous Deploy) solutions to automate the software lifecycle process (SLD) is growing.

2019

Hacktoberfest Owasp
·402 words·2 mins
October is here and everyone is running after their 4 PR’s to win a digitalocean t-shirt!
Getting to Know OWASP
·353 words·2 mins
Open Web Application Security Project # Open Community # OWASP is an open international community dedicated to helping organizations develop, acquire, and operate reliable applications.
Escrevendo artigos e palestras
·616 words·3 mins
Escrevendo artigos e palestras # Veja como começar a compartilhar conhecimento de umas vez por todas.

2018

Unraveling Blockchain
·1298 words·7 mins
It’s been almost 10 years since Satoshi Nakamoto’s paper introduced the concept of a peer-to-peer electronic cash system, and you still don’t know what Bitcoin is, let alone Blockchain.