DevSecOps Guides
Subscribe
Sign in
Home
Notes
Guides
Archive
About
Latest
Top
AWS CSPM Playbook
Cloud Security Posture Management (CSPM) Cheatsheet
15 hrs ago
•
Reza
Share this post
DevSecOps Guides
AWS CSPM Playbook
Copy link
Facebook
Email
Notes
More
AWS EC2 Attack and Defend:
The Battle for the Cloud's Beating Heart
Jun 16
•
Reza
2
Share this post
DevSecOps Guides
AWS EC2 Attack and Defend:
Copy link
Facebook
Email
Notes
More
AWS S3 Attack and Defend
A Journey Between Shadows and Shields
Jun 9
•
Reza
Share this post
DevSecOps Guides
AWS S3 Attack and Defend
Copy link
Facebook
Email
Notes
More
April 2025
AWS ABAC Cheatsheet
AWS Attribute-Based Access Control (ABAC) — Grants permissions dynamically based on matching attributes between IAM principals and AWS resources…
Apr 23
•
Reza
Share this post
DevSecOps Guides
AWS ABAC Cheatsheet
Copy link
Facebook
Email
Notes
More
January 2025
Vulnerability Bill of Materials
A Bill of Materials (BOM) is a crucial component in software development and supply chain management, providing a detailed list of components…
Jan 26
•
Reza
Share this post
DevSecOps Guides
Vulnerability Bill of Materials
Copy link
Facebook
Email
Notes
More
Virtual Patching Best Practices
Virtual patching is a crucial security strategy within the DevSecOps framework, offering a quick and effective way to mitigate vulnerabilities in web…
Jan 26
•
Reza
Share this post
DevSecOps Guides
Virtual Patching Best Practices
Copy link
Facebook
Email
Notes
More
Attacking MongoDB
MongoDB attacks often exploit misconfigurations, particularly when authentication and network controls are not properly enforced.
Jan 26
•
Reza
Share this post
DevSecOps Guides
Attacking MongoDB
Copy link
Facebook
Email
Notes
More
HTTP Security Headers
1.
Jan 26
•
Reza
2
Share this post
DevSecOps Guides
HTTP Security Headers
Copy link
Facebook
Email
Notes
More
Payment Vulnerabilities
In today's digital landscape, securing payment systems is critical to protecting financial transactions and user data.
Jan 26
•
Reza
1
Share this post
DevSecOps Guides
Payment Vulnerabilities
Copy link
Facebook
Email
Notes
More
File Upload Vulnerabilities
File upload vulnerabilities can lead to severe security breaches if not handled properly.
Jan 26
•
Reza
Share this post
DevSecOps Guides
File Upload Vulnerabilities
Copy link
Facebook
Email
Notes
More
Attacking pfSense
Attacking pfSense, a popular open-source firewall and router platform, typically involves targeting its various components and configurations to exploit…
Jan 26
•
Reza
Share this post
DevSecOps Guides
Attacking pfSense
Copy link
Facebook
Email
Notes
More
Attacking Nginx
Nginx, a popular web server and reverse proxy, is a critical component in many web infrastructures, making it a prime target for attacks.
Jan 26
•
Reza
1
Share this post
DevSecOps Guides
Attacking Nginx
Copy link
Facebook
Email
Notes
More
Share
Copy link
Facebook
Email
Notes
More
This site requires JavaScript to run correctly. Please
turn on JavaScript
or unblock scripts