0xm154n7hr0p3Secure Your Docker ContainerHere’s a quick, practical checklist for hardening Docker containers with commands and examples.Oct 30Oct 30
0xm154n7hr0p3Pentesting Docker 101Docker containers are widely used in application deployment, but they come with security risks. In this guide, we’ll dive into Docker…Oct 28Oct 28
0xm154n7hr0p3Matrix Writeup: Defensys_CTF 2024Matrix is a Medium level Reverse Engineering Challenge I made for the Defensys CTF 2024.Mar 8Mar 8
0xm154n7hr0p3Secure your NodeJs app 101!This article will be a cheat sheet for securing your NodeJs app, I will not explain the vulnerabilities, because each one needs its own…Oct 25, 2023Oct 25, 2023
0xm154n7hr0p3How hackers work: Using DNS to Leak data and stay undetectedDISCLAIMERAug 27, 20231Aug 27, 20231