Writing

What is Open Graph: A Comprehensive Guide

July 27th, 2024

Dont waste money on monitoring your startup

April 16th, 2024

I created my first startup to promote your startup

March 20th, 2024

I started a newsletter to document my journey

March 12th, 2024

Jmeter vs k6

December 29th, 2023

How to Become Performance Tester in 2023?

December 29th, 2023

Loki: Effective Logging and Log Aggregation with Grafana

December 29th, 2023

Using ChatGPT to write nuclei exploits

December 29th, 2023

Nuclei unleashed - writing first exploit

December 29th, 2023

Why standard deviation is important in performance tests

December 29th, 2023

Afrog explained for bug bounty hunters

December 28th, 2023

My impressions of using the Drill performance testing tool

December 28th, 2023

AWS EC2 Instances basics

December 28th, 2023

How to get started in IT (your first job)

December 26th, 2023

Continous Profiling with Grafana Pyroscope

December 24th, 2023

What is Apache Kafka and how to perform performance tests on it (Part 2)

December 18th, 2023

Better monitoring of Traces with Grafana Tempo

December 15th, 2023

Load Balancers Explained

December 14th, 2023

What is Apache Kafka and how to perform performance tests on it (Part 1)

December 12th, 2023

What is bind shell and reverse shell

December 12th, 2023

What are the types of deployment

December 11th, 2023

What are the concepts of availability, load balancing, failover and session persistence

December 10th, 2023

Using mitmproxy with k6

December 9th, 2023

Launching Python Course for Beginners

December 8th, 2023

How to quickly debug requests from k6 test scenarios

December 7th, 2023

What are memory leaks?

December 7th, 2023

What is browser based load testing

December 5th, 2023

How to quickly read summary data in k6 from json file

December 4th, 2023

Fundamental network tools

December 4th, 2023

Crucial update for k6 results analysis

December 4th, 2023

Hacking embedded systems using the routersploit tool

December 4th, 2023

SYN Flood Attack

December 3rd, 2023

DoS vs DDoS vs DRDDoS vs PoD attack

December 3rd, 2023

State SSL certificates — what are the risks

December 3rd, 2023

What are polyglots and how to use them as a pentester

December 3rd, 2023

LDAP protocol basics and the LDAP Injection attack

December 3rd, 2023

What is bind shell and reverse shell

December 2nd, 2023

What is Forward Proxy and Reverse Proxy

December 2nd, 2023

What is WAF and IPS (Intrusion Prevention System & Web Application Firewall)

December 2nd, 2023

Metasploit explained for pentesters

December 1st, 2023

Content Security Policy explained

December 1st, 2023

Search for sensitive data using theHarvester and h8mail tools

December 1st, 2023

Scanning ports and finding network vulnerabilities using nmap

December 1st, 2023

“Scary” Rogue Access Point attack

December 1st, 2023

What is a zero-day (0-day) exploit? Real-life examples

December 1st, 2023

What is insecure deserialization

December 1st, 2023

What are and how to read CVEs (Common Vulnerabilities and Exposures)?

November 30th, 2023

Security risks associated with using the git version control system

November 30th, 2023

Understanding the Cross Site Request Forgery (CSRF) attack

November 30th, 2023

Cross-Origin Resource Sharing (CORS). How does it work?

November 30th, 2023

Linux basics

November 30th, 2023

What is path travelsal vulnerability?

November 30th, 2023

What is the TCP/IP model

November 30th, 2023

What is SSL Certificate

November 30th, 2023

DNS Protocol explained

November 30th, 2023

Insecure Direct Object Reference (IDOR) vulnerability types

November 30th, 2023

What is JWT (Json Web Token)

November 29th, 2023

X-Frame-Options header explained

November 29th, 2023

Checking network devices in Shodan search engine

November 29th, 2023

Docker explained for pentesters

November 29th, 2023

How to optimise JMeter for performance tests

November 29th, 2023

More on

Medium

and

Dev.to.