Published inCRED EngineeringSecuring the Cloud: Migrating to IMDSv2 for AWS Compute Workloadsdelve into the details of what IMDS is and why migrating to IMDSv2 is crucial for securing your workloads on AWS ECS, EC2 instances, and…Jan 5, 2024A response icon1Jan 5, 2024A response icon1
Demystifying Off-Campus PlacementsA short guide to the Unorthodox Path of Grabbing an Off-Campus JobFeb 17, 2021Feb 17, 2021
Fuzzing Applications with American Fuzzy Lop (AFL)What is Fuzzing?Jun 21, 2020A response icon1Jun 21, 2020A response icon1
Published inAppseccoMy experience as an intern learning about DevSecOps at Appsecco.I got a chance to intern at Appsecco for my 8th Semester project on DevSecOps.May 4, 2020A response icon1May 4, 2020A response icon1
Why do we use `if __name__ == “__main__”:` in Python?Demystifying how to write Modular Code in Python.Nov 24, 2019A response icon1Nov 24, 2019A response icon1
Published inGDSC VIT VelloreDeserialization AttacksAn introduction to attacks based on insecure deserialization.Jun 11, 2019Jun 11, 2019
Published inGDSC VIT VelloreUnderstanding the OWASP Top 10 Vulnerabilites (2017)A brief explanation of the OWASP’s top 10 vulnerabilities.Jun 9, 2019Jun 9, 2019