How to Install CodeQL: A Complete GuideLearn how to install CodeQL on MacOS, Linux, and Windows. Follow the step-by-step guide to set up this powerful SAST tool for your…Jan 218Jan 218
Encryption vs Encoding: The Real DealAs a developer, I’ve seen countless colleagues mix up encryption and encoding. It’s a common mistake that can lead to serious security…Jan 1452Jan 1452
How to Install Semgrep: A Comprehensive Guide for DevelopersLearn how to install Semgrep on MacOS, Linux, WSL, and Docker. Follow the step-by-step guide to set up this powerful yet simple SAST tool…Jul 17, 202473Jul 17, 202473
Published inbetter appsecJSON Web Tokens (JWTs) Explained: Everything You Need to KnowA detailed look at JSON Web Tokens (JWTs) and how to best use them for modern web applications.Jun 1, 20249Jun 1, 20249
How to set up Django with Postgres from NeonIn this blog post, you’ll learn how to connect Django to Neon Serverless Postgres. We’ll start with a simple Django CRUD app as our example…Feb 10, 202448Feb 10, 202448
Published inGitGuardianHow to Secure Your CI/CD Pipelines with GitGuardian HoneytokensIn the realm of software development, Continuous Integration and Continuous Deployment (CI/CD) pipelines have become integral. They…Jul 10, 20232Jul 10, 20232
Published inGitGuardianHow to Handle Secrets in TerraformIn today’s fast-paced world of cloud computing and infrastructure as code (IaC), efficiently managing your resources and keeping them…May 31, 2023May 31, 2023
Published inGitGuardianHow to Handle Secrets in KubernetesKubernetes has become the de facto standard for container orchestration, enabling organizations to build, deploy, and scale modern…May 19, 2023May 19, 2023
Published inGitGuardianHow to Handle Secrets in JenkinsJenkins is a popular open-source automation server that is widely used for building, testing, and deploying software. It allows developers…Apr 11, 20235Apr 11, 20235
Published inGitGuardianHow to Handle AWS SecretsSecure management of AWS secrets is essential for protecting sensitive data and preventing unauthorized access to critical systems and…Apr 7, 20232Apr 7, 20232
Published inGitGuardianHow to Handle Secrets in DockerSecrets management in Docker is a critical security concern for any business. When using Docker containers, it is essential to keep…Feb 17, 20231Feb 17, 20231
Published inGitGuardianHow to Handle Secrets in PythonWe live in a world where applications are used to do everything, be it stock trading or booking a salon, but behind the scenes, the…Jan 30, 20232Jan 30, 20232
Published inGitGuardian9 Things to Consider When Choosing an SCA ToolIn the past, the development of software was something that required a lot of effort and resources. Basically, every piece of code was…Dec 7, 202211Dec 7, 202211
Published inGitGuardianBest practices for managing developer teams in GitHub OrgsAre you looking for ways to manage your developer team better? GitHub Orgs is a great way to keep track of repositories, branches, and…Nov 4, 20221Nov 4, 20221
Published inInfoSec Write-upsAutomating XSS using Dalfox, GF and WaybackurlsHello Everyone! 😄Nov 15, 20204543Nov 15, 20204543
Published inInfoSec Write-upsExploiting Business Logic — Wallet MoneyHello Hunters!Jul 30, 2020124Jul 30, 2020124
Published inInfoSec Write-upsBypassing Rate Limit like a PRO !Hello Bug Bounty Hunters!Jun 19, 20204003Jun 19, 20204003
Published inInfoSec Write-upsAn Unexpected Bounty — Email Bounce IssuesHello Everyone ! Here’s is my write-up regarding a bug that you would have never heard before.Feb 5, 20202612Feb 5, 20202612