Microservices: From 0 to OK 👌In this write up, lets start by designing an e-commerce application and gradually re-designing them as microservices as well as how to…Aug 31Aug 31
CSRF: The Fake Door to Your Sensitive DataThis is a continuation of my previous story on CORS Misconfiguration: The Hidden Door to Your Sensitive Data and I will try to use the same…Aug 24Aug 24
CORS Misconfiguration: The Hidden Door to Your Sensitive DataAnalogy: Imagine you have a special guest list for your house party, allowing only certain friends to enter. If you accidentally leave the…Aug 21Aug 21
TLS Certificate handshake and provisioningThe SSL handshake process begins with the client initiating communication by sending a ClientHello message, which includes the maximum…Aug 18Aug 18
My Notes on Kubernetes v1This is dedicated for people, like me, who have a hard time understanding the kubernetes components 🤓Jul 21Jul 21
Universal Windows Shellcode — part 1Writing a universal shellcode exploit for Windows Operating SystemsDec 28, 2020Dec 28, 2020
Bypassing Windows DEP (Data Execution Prevention) Using ROP (Return Oriented Programming)Another perspective in bypassing AlwaysOn DEPSep 26, 2020Sep 26, 2020
Bypassing Windows DEP (Data Execution Prevention)Bypassing DEP on Windows XP Service Pack 2Sep 18, 2020Sep 18, 2020
MS08–067 Exploit DevelopmentA Guide to writing an exploit for the famous MS08–067 vulnerabilitySep 13, 2020Sep 13, 2020