5 followers
Software Engineer || Security Researcher
Intro There is a chain of designing flaws in the source code that result in bypass rate limiting to achieve privileges escalation via brute-forcing...
Introduction PDF generator libraries, particularly those implemented using JavaScript, often face vulnerabilities to cross-site scripting (XSS)...
Inspiration Some years back, I wanted to link two systems talking to each other through Linux commands. It was just a project out of curiosity, and...
Hardware devices required Raspberry Pi Ultrasonic sensor Jumper wires Software required Tuya IoT platform Link SDK python package Tuya Smart app...
Git-branching model (Part 2) · Refresh From Part 1 of this article, we discussed about --no-ff flag when merging. It helps to keep track of log messages...
A guide for git-branching model (Part 1) · Building a software in a team requires a clear understanding and proper management of the codebase. If the...