Automate AWS Budgets and Alerts NowIf you’ve ever cringed when reading your monthly AWS bill, you’re not alone. Cloud environments make it easy to scale, experiment, and…Dec 6, 2024Dec 6, 2024
Automatically Isolate Compromised EC2 Instances with GuardDutyImagine your AWS environment as a bustling city. Your EC2 instances are the vital infrastructure — hospitals, power plants, and data…Jul 26, 2024Jul 26, 2024
Unlocking Secrets: Mastering Blind SQL Injection Time Delay TechniquesIn the cybersecurity realm, knowledge is power. Today, I’m excited to share a guide on identifying and exploiting blind SQL injection…Apr 2, 2024Apr 2, 2024
Shift-Left SecurityIn the world of software development, speed often takes the spotlight, but security matters just as much. That’s where “shift-left…Feb 20, 2024Feb 20, 2024
🛡️ Keycloak & Docker Integration: Secure Your Realm. Part-2A few days ago I wrote about Part-1 Revolutionize Authentication: Keycloak Holds the Magic! that can help you secure your Auth access.Feb 6, 20242Feb 6, 20242
Revolutionize Authentication: Keycloak Holds the Magic! Part-1This open-source, Java-based software serves as an Identity and Access Management (IAM) system, facilitating the administration of users…Jan 30, 2024Jan 30, 2024
Hackers’ Limbo: When the Bug Bounty Trail Goes ColdNavigating the Abyss of HackingAug 12, 2023Aug 12, 2023
Summarize a Email Newsletter with ChatGPTRevolutionize your email game with the power of AI! Summarize your newsletters with ease using Python and ChatGPT.Mar 9, 2023Mar 9, 2023
Is Your Website Vulnerable to CSRF Attacks? Find Out NowHave you ever clicked on a link that took you somewhere you didn’t expect? It can be a bit unnerving, right? Well, imagine if that link led…Mar 2, 2023Mar 2, 2023
Never Experience Downtime Again:Prevent Downtime with Aiden Watch: An Open-Source SolutionAre you tired of constantly checking your application’s endpoints for errors? Do you wish you had a digital watchdog to do it for you?Feb 24, 2023Feb 24, 2023