Open in app

Sign in

Write

Sign in

Ayush Priya
Ayush Priya

72 followers

Home

About

CRED Engineering

Published in

CRED Engineering

Securing the Cloud: Migrating to IMDSv2 for AWS Compute Workloads

delve into the details of what IMDS is and why migrating to IMDSv2 is crucial for securing your workloads on AWS ECS, EC2 instances, and…

Jan 5, 2024
1
Securing the Cloud: Migrating to IMDSv2 for AWS Compute Workloads
Securing the Cloud: Migrating to IMDSv2 for AWS Compute Workloads
Jan 5, 2024
1

Demystifying Off-Campus Placements

A short guide to the Unorthodox Path of Grabbing an Off-Campus Job

Feb 17, 2021
Feb 17, 2021

Optimized Fuzzing with American Fuzzy Lop (AFL)

What does optimization mean?

Jun 28, 2020
Optimized Fuzzing with American Fuzzy Lop (AFL)
Optimized Fuzzing with American Fuzzy Lop (AFL)
Jun 28, 2020

Fuzzing Applications with American Fuzzy Lop (AFL)

What is Fuzzing?

Jun 21, 2020
1
Fuzzing Applications with American Fuzzy Lop (AFL)
Fuzzing Applications with American Fuzzy Lop (AFL)
Jun 21, 2020
1
Appsecco

Published in

Appsecco

My experience as an intern learning about DevSecOps at Appsecco.

I got a chance to intern at Appsecco for my 8th Semester project on DevSecOps.

May 4, 2020
1
My experience as an intern learning about DevSecOps at Appsecco.
My experience as an intern learning about DevSecOps at Appsecco.
May 4, 2020
1

Why do we use `if __name__ == “__main__”:` in Python?

Demystifying how to write Modular Code in Python.

Nov 24, 2019
1
Why do we use `if __name__ == “__main__”:` in Python?
Why do we use `if __name__ == “__main__”:` in Python?
Nov 24, 2019
1
GDSC VIT Vellore

Published in

GDSC VIT Vellore

Deserialization Attacks

An introduction to attacks based on insecure deserialization.

Jun 11, 2019
Deserialization Attacks
Deserialization Attacks
Jun 11, 2019
GDSC VIT Vellore

Published in

GDSC VIT Vellore

Understanding the OWASP Top 10 Vulnerabilites (2017)

A brief explanation of the OWASP’s top 10 vulnerabilities.

Jun 9, 2019
Understanding the OWASP Top 10 Vulnerabilites (2017)
Understanding the OWASP Top 10 Vulnerabilites (2017)
Jun 9, 2019
Ayush Priya

Ayush Priya

72 followers

A Python Developer and a Security Enthusiast!

Following
  • CRED Engineering

    CRED Engineering

  • The Airbnb Tech Blog

    The Airbnb Tech Blog

  • Shrusti Ghela

    Shrusti Ghela

  • Netflix TechBlog

    Netflix TechBlog

  • Netflix Technology Blog

    Netflix Technology Blog

See all (24)

Help

Status

About

Careers

Press

Blog

Privacy

Rules

Terms

Text to speech