Open in app

Sign In

Write

Sign In

Avi Lumelsky
Avi Lumelsky

336 Followers

Home

About

Published in

InfoSec Write-ups

·Pinned

Sandboxing Python dependencies in your code

Running code from an untrusted source is still an unsolved issue. Especially in dynamic languages like Python and Javascript. I will begin with 2 unanswered questions; If you import requests for http, why should requests be able to open a terminal and switch to sudo? If you import logging, Why…

Dtrace

8 min read

Sandboxing Python dependencies in your code
Sandboxing Python dependencies in your code
Dtrace

8 min read


Published in

InfoSec Write-ups

·Pinned

How I Discovered Thousands of Open Databases on AWS

My journey on finding and reporting databases with sensitive data about Fortune-500 companies, Hospitals, Crypto platforms, Startups during due diligence, and more. Table Of Contents Overview Background My Hypothesis Scanning BI & Automation: From thousands to hundreds Examples of data I found Conclusion Overview It is easy to find misconfigured assets…

AWS

10 min read

How I Discovered Thousands of Open Databases on AWS
How I Discovered Thousands of Open Databases on AWS
AWS

10 min read


Published in

InfoSec Write-ups

·Pinned

Browsers Are Localhost Gateways: Client Port Scanning Using WebAssembly And Go

Websites tend to scan the open ports of their users, from the browser, to identify new/returning users better. Can ‘localhost’ be abused by the browser? Can it be done through WebAssembly? Live Demo is available at http://ports.sh or https://ports.sh, The code is available at https://github.com/avilum/portsscan, You are welcome to contribute! …

Browsers

9 min read

Identify Website Users By Client Port Scanning — Using WebAssembly And Go
Identify Website Users By Client Port Scanning — Using WebAssembly And Go
Browsers

9 min read


Published in

InfoSec Write-ups

·Pinned

Facebook Knows What You Eat: Discover The Entire Data Facebook Collects About You, Step By Step.

I bet most Facebook users are not aware of what they really know about them. What if I told you that YOU can visualize it in just 5 minutes? A story of how I have explored https://facebook.com/dyi programmatically. I’m gonna show you how to do it yourself, and we will…

Facebook

7 min read

Facebook Knows What You Eat: Discover The Entire Data Facebook Collects About You, Step By Step.
Facebook Knows What You Eat: Discover The Entire Data Facebook Collects About You, Step By Step.
Facebook

7 min read


Published in

InfoSec Write-ups

·Pinned

Google Phishing with SSL: Google.news is not google.news

Back in 2016, I ran into a post about someone buying ɢoogle.com. It was used for phishing proposes (notice the first G). Homographic characters look like ASCII letters, but their encoding is different, in a way that is usually not noticeable for the human eye. Phishing is the fraudulent attempt…

Google

7 min read

POC For Google Phishing In 10 Minutes: ɢoogletranslate.com
POC For Google Phishing In 10 Minutes: ɢoogletranslate.com
Google

7 min read


Published in

InfoSec Write-ups

·Sep 3

Secure FastAPI with eBPF

Leverage eBPF to secure internet-facing APIs: FastAPI, BlackSheep, Flask, Django, aiohttp, Tornado, and more. In the previous post, I used secimport to secure PyTorch code. I showed how PyTorch models from insecure sources can be evaluated safely on any Linux machine. Table Of Contents: A word about API security — How to trace…

Api Security

8 min read

Secure FastAPI with eBPF
Secure FastAPI with eBPF
Api Security

8 min read


Published in

InfoSec Write-ups

·Jul 23

Secure PyTorch Models with eBPF

This article was not generated by GPT In this blog, I will present secimport — a toolkit for creating and running sandboxed applications in Python that utilizes eBPF (bpftrace) to secure Python runtimes. I will start with why it is needed (feel free to skip that part), and then demonstrate how…

Sandbox

10 min read

Secure PyTorch Models with eBPF
Secure PyTorch Models with eBPF
Sandbox

10 min read


Published in

Deci AI

·Jul 22, 2021

Infery — Run Deep Learning Inference with Only 3 Lines of Python Code

Imagine having the power of all frameworks at your fingertips with one friendly yet powerful API Our mission is to help AI developers easily build, optimize, and deploy deep learning models. As part of this mission, we developed Infery, a Python runtime engine that transforms running inference on optimized models…

Inference

7 min read

Infery — Run Deep Learning Inference with Only 3 Lines of Python Code
Infery — Run Deep Learning Inference with Only 3 Lines of Python Code
Inference

7 min read

Avi Lumelsky

Avi Lumelsky

336 Followers

A business-oriented security researcher, who loves Privacy and AI, with deep security insights.

Following
  • Prof Bill Buchanan OBE

    Prof Bill Buchanan OBE

  • Nathaniel Meron

    Nathaniel Meron

  • Alasdair Allan

    Alasdair Allan

  • Noam Shakuri

    Noam Shakuri

  • Nitz Goren

    Nitz Goren

See all (33)

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech

Teams