PinnedPublished inInfoSec Write-upsAPI Security for DevelopersChecklist for Developers for securing APIsJan 23, 2023A response icon8Jan 23, 2023A response icon8
PinnedPublished inInfoSec Write-upsA tale of a full Business Takeover — Red Team DiariesThis story is going to be about a Red Team engagement conducted on a big fashion brand that is owned and ran by a small family in India…Feb 11, 2023Feb 11, 2023
PinnedPublished inInfoSec Write-upsHow I chained multiple CVEs & other vulnerabilities during a Red Team engagement — Red Team DiariesThe exploitation of Pulse VPN application to gain full control on the VPN server and pivot across the cloud infrastructure.Jul 25, 2022Jul 25, 2022
PinnedPublished inInfoSec Write-upsCVE-2022–32511 | Exploit | Remote Code ExecutionDescription:Jun 29, 2022Jun 29, 2022
PinnedPublished inInfoSec Write-upsFinding Zero days in Enterprise ApplicationA tale of ‘Site-wide Account Takeover’Jul 17, 2022Jul 17, 2022
Published inInfoSec Write-upsBest Security Practice for CI/CD Pipeline & DevOps Team | OWASP’s Top 10 CI/CD Examples & SolutionSecure Your CI/CD Pipeline: A Deep Dive into OWASP’s Top 10 CI/CD Security Risks with Practical ExamplesAug 26, 2024A response icon1Aug 26, 2024A response icon1
Published inInfoSec Write-upsA Comprehensive approach for testing for SQL Injection VulnerabilitiesTL;DRSep 6, 2023A response icon2Sep 6, 2023A response icon2
Published inInfoSec Write-upsOWASP API Top 10 — API SecurityTL;DR — The blogs covers code samples that highlight common vulnerabilities related to the OWASP API Top 10. This blog will cover each…Jul 14, 2023A response icon2Jul 14, 2023A response icon2
Published inInfoSec Write-upsWeb Application Penetration ChecklistTL;DRMar 29, 2023A response icon1Mar 29, 2023A response icon1