5 followers
Solving complex problems with code and automation (Software Developer) || Improving security in opensource and enterprise software (Security Researcher)
Intro A strory of CVE-2024-25277 There is a chain of designing flaws in the source code that result in bypass rate limiting to achieve privileges...
Introduction PDF generator libraries, particularly those implemented using JavaScript, often face vulnerabilities to cross-site scripting (XSS)...
Inspiration Some years back, I wanted to link two systems talking to each other through Linux commands. It was just a project out of curiosity, and...
Hardware devices required Raspberry Pi Ultrasonic sensor Jumper wires Software required Tuya IoT platform Link SDK python package Tuya Smart app...
Git-branching model (Part 2) · Refresh From Part 1 of this article, we discussed about --no-ff flag when merging. It helps to keep track of log messages...
A guide for git-branching model (Part 1) · Building a software in a team requires a clear understanding and proper management of the codebase. If the...