crązŷ𐌱rąiɲSonarQube integration to NodejsThis article will discuss how we can integrate the SonarQube with the NodeJs project. We are not covering the basics of installing…3d ago3d ago
crązŷ𐌱rąiɲQuishing — A squishy way for phishingScamming people with a phishing email that contains a QR code!Nov 4, 2023Nov 4, 2023
crązŷ𐌱rąiɲinSystem WeaknessAWS Fargate Task and Container securityThis week I got a chance to do a security analysis on ECS containers running on AWS Fargate. It is really impressing the default security…Jan 28, 2023Jan 28, 2023
crązŷ𐌱rąiɲSonarQube on Javascript projectsIn this article we will be looking through the steps to follow for running a SonarQube scan on the projects written in Javascript.Nov 23, 2022Nov 23, 2022
crązŷ𐌱rąiɲinSystem WeaknessGenerate software bill of material(SBOM) on Maven projectsUsing CycloneDX Maven plugin.Aug 4, 2022Aug 4, 2022
crązŷ𐌱rąiɲDo stored procedure prevent SQL Injection?In this article we will discuss how we can prevent SQLi using stored procedure.Jul 14, 2022Jul 14, 2022
crązŷ𐌱rąiɲinSystem WeaknessDo parameterised queries prevent SQL Injection?If we search for SQL injection(SQLi) on internet, we can see parameterised queries or prepared statements are the effective way to prevent…Jul 14, 2022Jul 14, 2022
crązŷ𐌱rąiɲAndroid Static analysis- How to pull APK?Pulling apk from Google Play store.Mar 10, 2022Mar 10, 2022
crązŷ𐌱rąiɲThick Client Penetration testing — TCP traffic interception using mitm_relay and Burp.Thick client applications are those application which provides rich set of functionalities runs on user’s machine independent of the…Feb 21, 2022Feb 21, 2022