2024  2

June  1

Reputation Farming in OSS: A Threat to Building Trust

June 27, 2024 Â· 3 min Â· Kumar Ashwin

April  1

Two Bits on the xz Vulnerability

April 1, 2024 Â· 7 min Â· Kumar Ashwin

2023  6

November  1

Handling Deprecated Dependencies In Your Project

November 7, 2023 Â· 6 min Â· Kumar Ashwin

September  1

VS Code Security: Looking at the IDE from Security Lens

September 14, 2023 Â· 6 min Â· Kumar Ashwin

July  1

Investigating Reported Vulnerabilities: A Closer Look!

July 30, 2023 Â· 2 min Â· Kumar Ashwin

June  1

Kubernetes Components

June 18, 2023 Â· 7 min Â· Kumar Ashwin

February  2

My Experiments with Raspberry Pi Pico - Poor Man’s Rubber Ducky

February 4, 2023 Â· 7 min Â· Kumar Ashwin

Docker Security

February 2, 2023 Â· 7 min Â· Kumar Ashwin

2022  7

October  1

Zone Identifier - Is your file downloaded from the internet?

October 6, 2022 Â· 2 min Â· Kumar Ashwin

July  4

Understanding DKIM - Email Security Series

July 26, 2022 Â· 4 min Â· Kumar Ashwin

Understanding SPF - Email Security Series

July 25, 2022 Â· 4 min Â· Kumar Ashwin

Linux - Command Line Struggles

July 4, 2022 Â· 2 min Â· Kumar Ashwin

gRPC: We are not RESTing Anymore

July 2, 2022 Â· 5 min Â· Kumar Ashwin

June  1

How is XSS different from CSRF?

June 28, 2022 Â· 4 min Â· Kumar Ashwin

January  1

Kubernetes Concept

January 17, 2022 Â· 5 min Â· Kumar Ashwin

2021  4

November  1

Anonymous Challenge Write-Up: WinjaCTF c0c0n 2021

November 15, 2021 Â· 1 min Â· Kumar Ashwin

June  2

This is why you need a personal Collaborator Client!

June 22, 2021 Â· 3 min Â· Kumar Ashwin

How does burp proxy work?

June 7, 2021 Â· 5 min Â· Kumar Ashwin

March  1

NULLCON 2021 Training: DEVSECOPS

March 27, 2021 Â· 7 min Â· Kumar Ashwin

2020  3

November  3

Exam Experience: CEH v10

November 27, 2020 Â· 2 min Â· Kumar Ashwin

Bug Bounty Summit CTF Writeup

November 2, 2020 Â· 6 min Â· Kumar Ashwin

Hacking Is Not Black & White

November 1, 2020 Â· 5 min Â· Kumar Ashwin