Published inCRED EngineeringSecuring the Cloud: Migrating to IMDSv2 for AWS Compute Workloadsdelve into the details of what IMDS is and why migrating to IMDSv2 is crucial for securing your workloads on AWS ECS, EC2 instances, and…Jan 5, 20241Jan 5, 20241
Demystifying Off-Campus PlacementsA short guide to the Unorthodox Path of Grabbing an Off-Campus JobFeb 17, 2021Feb 17, 2021
Published inAppseccoMy experience as an intern learning about DevSecOps at Appsecco.I got a chance to intern at Appsecco for my 8th Semester project on DevSecOps.May 4, 20201May 4, 20201
Why do we use `if __name__ == “__main__”:` in Python?Demystifying how to write Modular Code in Python.Nov 24, 20191Nov 24, 20191
Published inGDSC VIT VelloreDeserialization AttacksAn introduction to attacks based on insecure deserialization.Jun 11, 2019Jun 11, 2019
Published inGDSC VIT VelloreUnderstanding the OWASP Top 10 Vulnerabilites (2017)A brief explanation of the OWASP’s top 10 vulnerabilities.Jun 9, 2019Jun 9, 2019