Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Building Own MAC: Part 1 - Encrypted, but Not Trusted
Cover image for Building Own MAC: Part 1 - Encrypted, but Not Trusted

Building Own MAC: Part 1 - Encrypted, but Not Trusted

Comments
5 min read
y509: A terminal user interface (TUI) tool for viewing and analyzing X.509 certificate chains

y509: A terminal user interface (TUI) tool for viewing and analyzing X.509 certificate chains

1
Comments
3 min read
SQL INJECTION
Cover image for SQL INJECTION

SQL INJECTION

Comments
1 min read
Tech Pulse – Weekly Tech Digest January 11, 2026
Cover image for Tech Pulse – Weekly Tech Digest January 11, 2026

Tech Pulse – Weekly Tech Digest January 11, 2026

5
Comments
4 min read
Automating AWS Security Scanning: Configuring Prowler on EC2 as a Cron Job to Detect Outdated AMIs

Automating AWS Security Scanning: Configuring Prowler on EC2 as a Cron Job to Detect Outdated AMIs

Comments
13 min read
[Learning Notes] [Golang] How to Develop OAuth2 PKCE with Golang - Using LINE Login as an Example

[Learning Notes] [Golang] How to Develop OAuth2 PKCE with Golang - Using LINE Login as an Example

Comments
8 min read
What Backend Developers Should Know About Passkeys (WWDC22)

What Backend Developers Should Know About Passkeys (WWDC22)

Comments
4 min read
[TW_DevRel] TECH-Verse 2022: Interesting Agenda Highlights - Day 1

[TW_DevRel] TECH-Verse 2022: Interesting Agenda Highlights - Day 1

Comments
3 min read
Kubernetes: About Kubernetes

Kubernetes: About Kubernetes

Comments
3 min read
Supply Chain Security: A Deep Dive into SBOM and Code Signing
Cover image for Supply Chain Security: A Deep Dive into SBOM and Code Signing

Supply Chain Security: A Deep Dive into SBOM and Code Signing

Comments
11 min read
[TIL] Exporting from Apple Notes

[TIL] Exporting from Apple Notes

Comments
3 min read
Golang for Mach-O File Reverse Engineering

Golang for Mach-O File Reverse Engineering

Comments
2 min read
Using Google Cloud Services on Heroku with Golang

Using Google Cloud Services on Heroku with Golang

Comments
2 min read
Digital Certificate Wallet: Beginner's Guide

Digital Certificate Wallet: Beginner's Guide

Comments
2 min read
AWS IAM basics explained with real examples
Cover image for AWS IAM basics explained with real examples

AWS IAM basics explained with real examples

Comments
5 min read
Your Proxy Should Only Allow Requests with a Custom Header — How Do You Do It in Apigee X?

Your Proxy Should Only Allow Requests with a Custom Header — How Do You Do It in Apigee X?

5
Comments
3 min read
TIL: Using PTT and Cloudflare to Block Web Crawlers?

TIL: Using PTT and Cloudflare to Block Web Crawlers?

Comments
1 min read
NodeSecure hidden capability: mama

NodeSecure hidden capability: mama

Comments
2 min read
Python Obfuscation: From Readable to Untraceable
Cover image for Python Obfuscation: From Readable to Untraceable

Python Obfuscation: From Readable to Untraceable

1
Comments
1 min read
Bug Bounty Hunting in 2026

Bug Bounty Hunting in 2026

Comments
4 min read
Week 4 Network Packet Tracing Challenge

Week 4 Network Packet Tracing Challenge

Comments
8 min read
This Week in AI: ChatGPT Health Risks, Programming for LLMs, and Why Indonesia Blocked Grok

This Week in AI: ChatGPT Health Risks, Programming for LLMs, and Why Indonesia Blocked Grok

Comments
5 min read
🚨 TypeORM Hook Gotcha: Password Not Hashing! 🚨
Cover image for 🚨 TypeORM Hook Gotcha: Password Not Hashing! 🚨

🚨 TypeORM Hook Gotcha: Password Not Hashing! 🚨

1
Comments 1
1 min read
Introducing Firebomb: Open Source Firebase Penetration Testing
Cover image for Introducing Firebomb: Open Source Firebase Penetration Testing

Introducing Firebomb: Open Source Firebase Penetration Testing

1
Comments
6 min read
KRACK Attack - When WPA2 Was Not as Safe as We Thought

KRACK Attack - When WPA2 Was Not as Safe as We Thought

Comments
1 min read
loading...