Writing
What is Open Graph: A Comprehensive Guide
Dont waste money on monitoring your startup
I created my first startup to promote your startup
I started a newsletter to document my journey
Jmeter vs k6
How to Become Performance Tester in 2023?
Loki: Effective Logging and Log Aggregation with Grafana
Using ChatGPT to write nuclei exploits
Nuclei unleashed - writing first exploit
Why standard deviation is important in performance tests
Afrog explained for bug bounty hunters
My impressions of using the Drill performance testing tool
AWS EC2 Instances basics
How to get started in IT (your first job)
Continous Profiling with Grafana Pyroscope
What is Apache Kafka and how to perform performance tests on it (Part 2)
Better monitoring of Traces with Grafana Tempo
Load Balancers Explained
What is Apache Kafka and how to perform performance tests on it (Part 1)
What is bind shell and reverse shell
What are the types of deployment
What are the concepts of availability, load balancing, failover and session persistence
Using mitmproxy with k6
Launching Python Course for Beginners
How to quickly debug requests from k6 test scenarios
What are memory leaks?
What is browser based load testing
How to quickly read summary data in k6 from json file
Fundamental network tools
Crucial update for k6 results analysis
Hacking embedded systems using the routersploit tool
SYN Flood Attack
DoS vs DDoS vs DRDDoS vs PoD attack
State SSL certificates — what are the risks
What are polyglots and how to use them as a pentester
LDAP protocol basics and the LDAP Injection attack
What is bind shell and reverse shell
What is Forward Proxy and Reverse Proxy
What is WAF and IPS (Intrusion Prevention System & Web Application Firewall)
Metasploit explained for pentesters
Content Security Policy explained
Search for sensitive data using theHarvester and h8mail tools
Scanning ports and finding network vulnerabilities using nmap
“Scary” Rogue Access Point attack
What is a zero-day (0-day) exploit? Real-life examples
What is insecure deserialization
What are and how to read CVEs (Common Vulnerabilities and Exposures)?
Security risks associated with using the git version control system
Understanding the Cross Site Request Forgery (CSRF) attack
Cross-Origin Resource Sharing (CORS). How does it work?
Linux basics
What is path travelsal vulnerability?
What is the TCP/IP model
What is SSL Certificate
DNS Protocol explained
Insecure Direct Object Reference (IDOR) vulnerability types
What is JWT (Json Web Token)
X-Frame-Options header explained
Checking network devices in Shodan search engine
Docker explained for pentesters
How to optimise JMeter for performance tests