July 27th, 2024 What is Open Graph: A Comprehensive Guide April 16th, 2024 Dont waste money on monitoring your startup March 20th, 2024 I created my first startup to promote your startup March 12th, 2024 I started a newsletter to document my journey December 29th, 2023 Jmeter vs k6 December 29th, 2023 How to Become Performance Tester in 2023? December 29th, 2023 Loki: Effective Logging and Log Aggregation with Grafana December 29th, 2023 Using ChatGPT to write nuclei exploits December 29th, 2023 Nuclei unleashed - writing first exploit December 29th, 2023 Why standard deviation is important in performance tests December 28th, 2023 Afrog explained for bug bounty hunters December 28th, 2023 My impressions of using the Drill performance testing tool December 28th, 2023 AWS EC2 Instances basics December 26th, 2023 How to get started in IT (your first job) December 24th, 2023 Continous Profiling with Grafana Pyroscope December 18th, 2023 What is Apache Kafka and how to perform performance tests on it (Part 2) December 15th, 2023 Better monitoring of Traces with Grafana Tempo December 14th, 2023 Load Balancers Explained December 12th, 2023 What is Apache Kafka and how to perform performance tests on it (Part 1) December 12th, 2023 What is bind shell and reverse shell December 11th, 2023 What are the types of deployment December 10th, 2023 What are the concepts of availability, load balancing, failover and session persistence December 9th, 2023 Using mitmproxy with k6 December 8th, 2023 Launching Python Course for Beginners December 7th, 2023 How to quickly debug requests from k6 test scenarios December 7th, 2023 What are memory leaks? December 5th, 2023 What is browser based load testing December 4th, 2023 How to quickly read summary data in k6 from json file December 4th, 2023 Fundamental network tools December 4th, 2023 Crucial update for k6 results analysis December 4th, 2023 Hacking embedded systems using the routersploit tool December 3rd, 2023 SYN Flood Attack December 3rd, 2023 DoS vs DDoS vs DRDDoS vs PoD attack December 3rd, 2023 State SSL certificates โ what are the risks December 3rd, 2023 What are polyglots and how to use them as a pentester December 3rd, 2023 LDAP protocol basics and the LDAP Injection attack December 2nd, 2023 What is bind shell and reverse shell December 2nd, 2023 What is Forward Proxy and Reverse Proxy December 2nd, 2023 What is WAF and IPS (Intrusion Prevention System & Web Application Firewall) December 1st, 2023 Metasploit explained for pentesters December 1st, 2023 Content Security Policy explained December 1st, 2023 Search for sensitive data using theHarvester and h8mail tools December 1st, 2023 Scanning ports and finding network vulnerabilities using nmap December 1st, 2023 โScaryโ Rogue Access Point attack December 1st, 2023 What is a zero-day (0-day) exploit? Real-life examples December 1st, 2023 What is insecure deserialization November 30th, 2023 What are and how to read CVEs (Common Vulnerabilities and Exposures)? November 30th, 2023 Security risks associated with using the git version control system November 30th, 2023 Understanding the Cross Site Request Forgery (CSRF) attack November 30th, 2023 Cross-Origin Resource Sharing (CORS). How does it work? November 30th, 2023 Linux basics November 30th, 2023 What is path travelsal vulnerability? November 30th, 2023 What is the TCP/IP model November 30th, 2023 What is SSL Certificate November 30th, 2023 DNS Protocol explained November 30th, 2023 Insecure Direct Object Reference (IDOR) vulnerability types November 29th, 2023 What is JWT (Json Web Token) November 29th, 2023 X-Frame-Options header explained November 29th, 2023 Checking network devices in Shodan search engine November 29th, 2023 Docker explained for pentesters November 29th, 2023 How to optimise JMeter for performance tests