InInfoSec Write-upsbyPiyush Kumawat (securitycipher)Advanced Web Application Security Checklist1. Authentication and Session ManagementSep 2, 20242Sep 2, 20242
InAppSec UntangledbyMohamed AboElKheirHow I contributed my first custom rule to Semgrep Rule RegistrySince I learned that Semgrep enables users to create and use custom SAST rules, I was instantly intrigued. That is mainly because the value…Mar 19, 2024Mar 19, 2024
InInfoSec Write-upsbydollarboysushilAuthentication Vulnerabilities- Lab #8 2FA (Two Factor Authentication) broken logicFor any correction / query /suggestion contact on Instagram dollarboysushil Twitter (X) dollarboysushil Youtube dollarboysushilNov 12, 2023Nov 12, 2023
ParitoshPython projects for cybersecurityCybersecurity is a critical field, and Python is a popular programming language for developing tools and projects in this domain.Oct 20, 20235Oct 20, 20235
theUnixeUsing ChatGPT to write nuclei exploits !!ChatGPT and AI have been experiencing their best days for several months. We can find their usage in truth everywhere. This has not…Jun 20, 2023Jun 20, 2023
Rémi LavedrineSecurity by Design — Everything you need to knowSecurity by Design is a method that will allow your team to take security into account from the start of a project. It has 8 main stepsJan 11, 2021Jan 11, 2021