Getting Started with Web3What would you need to get your hands dirty and to begin exploring Web3? A basic list of tools you can opt for, include npm, hardhat…Sep 13, 2022Sep 13, 2022
Terraform Destroy: It’s Easy!Whenever I use AWS services, my biggest concern after I am done using the services has always been —Dec 21, 2020Dec 21, 2020
Towards a new beginning!When someone asks me to do something, my natural tendency is generally to say “no”. Maybe, because I buy time to think through things and…Sep 21, 2020Sep 21, 2020
Published inAppseccoServer Side Request Forgery via HTML injection in PDF downloadA post about how I approached a novel security issue and now I feel I achieved an important milestone in my journey as a pentester.Apr 8, 2020Apr 8, 2020
Published inAppseccoVyAPI — The Modern Cloud-Based Vulnerable Hybrid Android AppIntroductionSep 12, 20191Sep 12, 20191
Published inAppseccoVyAPI — The Story of a Vulnerable Hybrid Android AppExactly 1 year, 4 months and 5 days ago, I joined the application security company known as Appsecco. The first few months at my workplace…Sep 12, 2019Sep 12, 2019
Published inAppseccoTalk Given at null community Bangalore Chapter about Identity and Access Management in Modern Web…According to Wikipedia, Identity and access management (IAM) is, in computer security, the security and business discipline thatJul 17, 2018Jul 17, 2018
Security Shepherd — Broken Auth and Session Management Challenge 5“Practice makes a man (and also women) perfect.” — This is something that we are all aware of at a conscious (or unconscious) level…Jul 1, 2018Jul 1, 2018