Forem

Grzegorz Piechnik profile picture

Grzegorz Piechnik

Performance Engineer, k6 Champion, Content Creator

Dont waste money on monitoring YOUR startup
Cover image for Dont waste money on monitoring YOUR startup

Dont waste money on monitoring YOUR startup

1
Comments 1
2 min read

Want to connect with Grzegorz Piechnik?

Create an account to connect with Grzegorz Piechnik. You can also sign in below to proceed if you already have an account.

Already have an account? Sign in
I started a newsletter to document my JOURNEY ✈️
Cover image for I started a newsletter to document my JOURNEY ✈️

I started a newsletter to document my JOURNEY ✈️

Comments
2 min read
Can you bypass every security? 🤔💻🔓 00:17

Can you bypass every security? 🤔💻🔓

3
Comments 2
1 min read
Jmeter vs k6
Cover image for Jmeter vs k6

Jmeter vs k6

3
Comments
5 min read
How to Become Performance Tester in 2023?
Cover image for How to Become Performance Tester in 2023?

How to Become Performance Tester in 2023?

1
Comments
5 min read
Loki: Effective Logging and Log Aggregation with Grafana
Cover image for Loki: Effective Logging and Log Aggregation with Grafana

Loki: Effective Logging and Log Aggregation with Grafana

3
Comments
5 min read
Using ChatGPT to write nuclei exploits
Cover image for Using ChatGPT to write nuclei exploits

Using ChatGPT to write nuclei exploits

1
Comments
4 min read
Nuclei unleashed - writing first exploit
Cover image for Nuclei unleashed - writing first exploit

Nuclei unleashed - writing first exploit

Comments
4 min read
Why standard deviation is important in performance tests
Cover image for Why standard deviation is important in performance tests

Why standard deviation is important in performance tests

1
Comments
2 min read
Afrog explained for bug bounty hunters
Cover image for Afrog explained for bug bounty hunters

Afrog explained for bug bounty hunters

1
Comments
2 min read
My impressions of using the Drill performance testing tool
Cover image for My impressions of using the Drill performance testing tool

My impressions of using the Drill performance testing tool

Comments
5 min read
AWS EC2 Instances basics
Cover image for AWS EC2 Instances basics

AWS EC2 Instances basics

Comments
3 min read
How to get started in IT (your first job)
Cover image for How to get started in IT (your first job)

How to get started in IT (your first job)

Comments
3 min read
Continous Profiling with Grafana Pyroscope
Cover image for Continous Profiling with Grafana Pyroscope

Continous Profiling with Grafana Pyroscope

7
Comments
6 min read
Massive Layoffs of Manual Testers?" 💼🔍

Massive Layoffs of Manual Testers?" 💼🔍

Comments 2
1 min read
🔥 What is Apache Kafka and how to perform performance tests on it (Part 2) 👨🏻‍💻
Cover image for 🔥 What is Apache Kafka and how to perform performance tests on it (Part 2) 👨🏻‍💻

🔥 What is Apache Kafka and how to perform performance tests on it (Part 2) 👨🏻‍💻

Comments
5 min read
Better monitoring of Traces with Grafana Tempo
Cover image for Better monitoring of Traces with Grafana Tempo

Better monitoring of Traces with Grafana Tempo

3
Comments
4 min read
Load Balancers Explained
Cover image for Load Balancers Explained

Load Balancers Explained

Comments
3 min read
What is Apache Kafka and how to perform performance tests on it (Part 1)
Cover image for What is Apache Kafka and how to perform performance tests on it (Part 1)

What is Apache Kafka and how to perform performance tests on it (Part 1)

Comments
4 min read
What is bind shell and reverse shell
Cover image for What is bind shell and reverse shell

What is bind shell and reverse shell

Comments
3 min read
What are the types of deployment
Cover image for What are the types of deployment

What are the types of deployment

Comments
3 min read
What are the concepts of availability, load balancing, failover and session persistence
Cover image for What are the concepts of availability, load balancing, failover and session persistence

What are the concepts of availability, load balancing, failover and session persistence

Comments
3 min read
Using mitmproxy with k6
Cover image for Using mitmproxy with k6

Using mitmproxy with k6

Comments
4 min read
Launching Python Course for Beginners 👾
Cover image for Launching Python Course for Beginners 👾

Launching Python Course for Beginners 👾

Comments
2 min read
How to quickly debug requests from k6 test scenarios
Cover image for How to quickly debug requests from k6 test scenarios

How to quickly debug requests from k6 test scenarios

Comments
3 min read
What are memory leaks?
Cover image for What are memory leaks?

What are memory leaks?

1
Comments
4 min read
What is browser based load testing
Cover image for What is browser based load testing

What is browser based load testing

5
Comments 1
4 min read
How to quickly read summary data in k6 from json file
Cover image for How to quickly read summary data in k6 from json file

How to quickly read summary data in k6 from json file

4
Comments
2 min read
Fundamental network tools
Cover image for Fundamental network tools

Fundamental network tools

Comments
4 min read
Crucial update for k6 results analysis
Cover image for Crucial update for k6 results analysis

Crucial update for k6 results analysis

Comments
5 min read
Hacking embedded systems using the routersploit tool
Cover image for Hacking embedded systems using the routersploit tool

Hacking embedded systems using the routersploit tool

5
Comments
2 min read
SYN Flood Attack
Cover image for SYN Flood Attack

SYN Flood Attack

Comments
2 min read
DoS vs DDoS vs DRDDoS vs PoD attack
Cover image for DoS vs DDoS vs DRDDoS vs PoD attack

DoS vs DDoS vs DRDDoS vs PoD attack

Comments
3 min read
State SSL certificates — what are the risks
Cover image for State SSL certificates — what are the risks

State SSL certificates — what are the risks

Comments
3 min read
What are polyglots and how to use them as a pentester
Cover image for What are polyglots and how to use them as a pentester

What are polyglots and how to use them as a pentester

Comments
4 min read
LDAP protocol basics and the LDAP Injection attack
Cover image for LDAP protocol basics and the LDAP Injection attack

LDAP protocol basics and the LDAP Injection attack

5
Comments 1
4 min read
What is bind shell and reverse shell
Cover image for What is bind shell and reverse shell

What is bind shell and reverse shell

4
Comments 2
3 min read
What is Forward Proxy and Reverse Proxy
Cover image for What is Forward Proxy and Reverse Proxy

What is Forward Proxy and Reverse Proxy

9
Comments
2 min read
What is WAF and IPS (Intrusion Prevention System & Web Application Firewall)
Cover image for What is WAF and IPS (Intrusion Prevention System & Web Application Firewall)

What is WAF and IPS (Intrusion Prevention System & Web Application Firewall)

Comments
3 min read
Metasploit explained for pentesters
Cover image for Metasploit explained for pentesters

Metasploit explained for pentesters

Comments
9 min read
Content Security Policy explained
Cover image for Content Security Policy explained

Content Security Policy explained

Comments
3 min read
Search for sensitive data using theHarvester and h8mail tools
Cover image for Search for sensitive data using theHarvester and h8mail tools

Search for sensitive data using theHarvester and h8mail tools

Comments
3 min read
Scanning ports and finding network vulnerabilities using nmap
Cover image for Scanning ports and finding network vulnerabilities using nmap

Scanning ports and finding network vulnerabilities using nmap

9
Comments
7 min read
“Scary” Rogue Access Point attack
Cover image for “Scary” Rogue Access Point attack

“Scary” Rogue Access Point attack

3
Comments
7 min read
What is a zero-day (0-day) exploit? Real-life examples
Cover image for What is a zero-day (0-day) exploit? Real-life examples

What is a zero-day (0-day) exploit? Real-life examples

Comments
3 min read
What is insecure deserialization
Cover image for What is insecure deserialization

What is insecure deserialization

Comments
3 min read
What are and how to read CVEs (Common Vulnerabilities and Exposures)?
Cover image for What are and how to read CVEs (Common Vulnerabilities and Exposures)?

What are and how to read CVEs (Common Vulnerabilities and Exposures)?

Comments
3 min read
Security risks associated with using the git version control system
Cover image for Security risks associated with using the git version control system

Security risks associated with using the git version control system

Comments
3 min read
Understanding the Cross Site Request Forgery (CSRF) attack
Cover image for Understanding the Cross Site Request Forgery (CSRF) attack

Understanding the Cross Site Request Forgery (CSRF) attack

Comments
5 min read
Cross-Origin Resource Sharing (CORS). How does it work?
Cover image for Cross-Origin Resource Sharing (CORS). How does it work?

Cross-Origin Resource Sharing (CORS). How does it work?

Comments
5 min read
Linux basics
Cover image for Linux basics

Linux basics

Comments
5 min read
What is path travelsal vulnerability?
Cover image for What is path travelsal vulnerability?

What is path travelsal vulnerability?

Comments
2 min read
What is the TCP/IP model
Cover image for What is the TCP/IP model

What is the TCP/IP model

Comments
6 min read
What is SSL Certificate
Cover image for What is SSL Certificate

What is SSL Certificate

Comments
6 min read
DNS Protocol explained
Cover image for DNS Protocol explained

DNS Protocol explained

Comments
5 min read
Insecure Direct Object Reference (IDOR) vulnerability types
Cover image for Insecure Direct Object Reference (IDOR) vulnerability types

Insecure Direct Object Reference (IDOR) vulnerability types

Comments
3 min read
What is JWT (Json Web Token)
Cover image for What is JWT (Json Web Token)

What is JWT (Json Web Token)

Comments
2 min read
X-Frame-Options header explained
Cover image for X-Frame-Options header explained

X-Frame-Options header explained

Comments
2 min read
Checking network devices in Shodan search engine
Cover image for Checking network devices in Shodan search engine

Checking network devices in Shodan search engine

1
Comments
2 min read
Docker explained for pentesters
Cover image for Docker explained for pentesters

Docker explained for pentesters

Comments 1
7 min read
loading...