Application Security and the Alliance Design MethodologyAs some of you may know, I am a member of the Institution of Engineers in Australia and hold a CPENG. Part of maintaining a CPENG is to…Apr 17, 2024Apr 17, 2024
Understanding and Resolving Local File Inclusion in C#I have written this short blog as a teaching source and quick reference about LFI in C#.Mar 17, 2024Mar 17, 2024
Pentesting — Prod vs Test EnvironmentPenetration Testing — Production vs Test EnvironmentFeb 1, 2024Feb 1, 2024
Understanding and Preventing JS Template Literal Injection AttacksAs a developer, you may have heard of SQL Injection attacks, where an attacker can inject malicious code into a SQL query to access or…Apr 19, 2023Apr 19, 2023
Thoughts on fasting!Fasting is not just a religious ritual, but also a powerful tool for improving our physical and mental health. According to scientific…Mar 23, 2023Mar 23, 2023
What is the Secure Software Development Life Cycle and Should I care?IntroductionDec 20, 2022Dec 20, 2022
Docker RepoI have been working on some Docker images for some fun and to expand on my coding knowledge, particularly assembler. The details are as…Apr 20, 2021Apr 20, 2021
Kali Docker on Windows — The Discussion — Setup (Shortish guide)The DiscussionFeb 14, 2021Feb 14, 2021