Nginx Security Configuration Review
Among the plethora of web servers, Nginx stands out for its high performance and powerful configuration options. However, its complex configurations can sometimes lead to security loopholes. This is where tools like Semgrep and Gixy come into the picture to fortify your Nginx server against potential vulnerabilities.
Creating your First Secure CI/CD Pipeline with GitHub Actions
In the world of DevOps, security is paramount. In this post, I'll guide you through setting up your first CI/CD pipeline on GitHub with robust security analysis stages using some of the best open-source tools available.
Intercepting Non-Proxy Aware Mobile Applications
Pentesting non-proxy-aware mobile applications is one of the challenges that pen testers occasionally face while testing mobile applications. This guide will walk through the process of fixing this issue
Fishing for a reverse shell
Recently I came across a scenario where I had to setup a publicly exposed cloud instance which could act as a listener to create a reverse shell. So I did!