AxolothTryHackMe | Linux Logs Investigations | WriteUpExplore Linux system logs for effective incident response.15h ago15h ago
AxolothTryHackMe | ORM Injection | WriteUpLearn how to exploit injection vulnerabilities in an ORM-based web app.1d ago1d ago
AxolothTryHackMe | Windows Applications Forensics | WriteUpPerform a live analysis on Windows systems, focused on determining the outliers based on known behaviour of scheduled tasks, services, and…3d ago3d ago
AxolothTryHackMe | Container Vulnerabilities | WriteUpLearn how some of the common vulnerabilities found within Docker containers can be exploited.5d ago5d ago
AxolothTryHackMe | Cluster Hardening | WriteUpLearn initial security considerations when creating a Kubernetes cluster.Jun 26Jun 26
AxolothTryHackMe | Cloud-based IaC | WriteUpLearn about infrastructure as code (IaC) using tools for cloud deployment.Jun 23Jun 23
AxolothTryHackMe | Intro to Kubernetes | WriteUpAn introduction to Kubernetes covering the basics of cluster creation and hardening.Jun 22Jun 22
AxolothTryHackMe | Snyk Code | WriteUpSecuring code with Snyk — a junior application security engineer’s journey.Jun 21Jun 21
AxolothTryHackMe | Snyk Open Source | WriteUpSecuring open-source dependencies with Snyk — a junior application security engineer’s journey.Jun 21Jun 21
AxolothTryHackMe | iOS Analysis | WriteUpDiscover the forensic artefacts present within iOS.Jun 20Jun 20