PinnedPublished inInfoSec Write-upsSandboxing Python dependencies in your codeRunning code from an untrusted source is still an unsolved issue. Especially in dynamic languages like Python and Javascript. I will begin…Jul 10, 20221Jul 10, 20221
PinnedPublished inInfoSec Write-upsHow I Discovered Thousands of Open Databases on AWSMy journey on finding and reporting databases with sensitive data about Fortune-500 companies, Hospitals, Crypto platforms, Startups during…Jan 23, 202211Jan 23, 202211
PinnedPublished inInfoSec Write-upsIdentify Website Users By Client Port Scanning — Using WebAssembly And GoWebsites tend to scan the open ports of their users, from the browser, to identify new/returning users better. Can ‘localhost’ be abused…Jul 25, 2021Jul 25, 2021
PinnedPublished inInfoSec Write-upsFacebook Knows What You Eat: Discover The Entire Data Facebook Collects About You, Step By Step.A story of how I explored https://facebook.com/dyi programmatically.Feb 3, 20213Feb 3, 20213
PinnedPublished inInfoSec Write-upsPOC For Google Phishing In 10 Minutes: ɢoogletranslate.comBack in 2016, I ran into a post about someone buying ɢoogle.com. It was used for phishing proposes (notice the first G). Homographic…Mar 12, 20202Mar 12, 20202
Published inInfoSec Write-upsSecure FastAPI with eBPFLeverage eBPF to secure internet-facing APIs: FastAPI, BlackSheep, Flask, Django, aiohttp, Tornado, and more.Sep 3, 20231Sep 3, 20231
Published inInfoSec Write-upsSecure PyTorch Models with eBPFThis article was not generated by GPTJul 23, 2023Jul 23, 2023
Infery — Run Deep Learning Inference with Only 3 Lines of Python CodeImagine having the power of all frameworks at your fingertips with one friendly yet powerful APIJul 22, 2021Jul 22, 2021