Published inDeHaatDefectDojo: Streamlining Security Efforts at DehaatDefectDojo is an open-source platform designed to help organizations streamline their security testing efforts by providing a centralized…Mar 10, 2023A response icon3Mar 10, 2023A response icon3
Published inDeHaatK8s RunTime Security at DehaatAt Dehaat, we are using Sysdig Falco with DataDog for runtime security and monitoring.Dec 5, 2022Dec 5, 2022
Published inDeHaatDevSecOps: Part One — ServerLess SAST at GitHub Action.What is DevSecOps?Jul 8, 2022Jul 8, 2022
Adding a malicious notebook to be treated like a trusted notebook in Google Colab — 1337$IntroductionJan 17, 2020A response icon1Jan 17, 2020A response icon1
Google sites and exploiting same origin policy.I was learning about the same origin policy i.e; Response of ajax call can be captured only if the call is from same origin or headers…Oct 22, 2018A response icon3Oct 22, 2018A response icon3
Clickjacking in Google Docs and Voice typing feature.What is Clickjacking?Oct 5, 2018A response icon1Oct 5, 2018A response icon1
Clickjackings in Google worth 14981.7$Instead of going for Cross Site Scripting, Remote Code Execution, SQL Injection, etc. I decided to find clickjacking in google and…Mar 6, 2018A response icon6Mar 6, 2018A response icon6
Facebook Bug Bounty ReportsReport 1 : How i was able to post in any facebook group on behalf of it’s members.Mar 6, 2018Mar 6, 2018