AxolothTryHackMe | On-Premises IaC | WriteUpThis room provides security guidance for on-premises infrastructure as code deployments.1d ago1d ago
AxolothTryHackMe | Linux Logs Investigations | WriteUpExplore Linux system logs for effective incident response.3d ago3d ago
AxolothTryHackMe | ORM Injection | WriteUpLearn how to exploit injection vulnerabilities in an ORM-based web app.4d ago4d ago
AxolothTryHackMe | Windows Applications Forensics | WriteUpPerform a live analysis on Windows systems, focused on determining the outliers based on known behaviour of scheduled tasks, services, and…6d ago6d ago
AxolothTryHackMe | Container Vulnerabilities | WriteUpLearn how some of the common vulnerabilities found within Docker containers can be exploited.Jun 30Jun 30
AxolothTryHackMe | Cluster Hardening | WriteUpLearn initial security considerations when creating a Kubernetes cluster.Jun 26Jun 26
AxolothTryHackMe | Cloud-based IaC | WriteUpLearn about infrastructure as code (IaC) using tools for cloud deployment.Jun 23Jun 23
AxolothTryHackMe | Intro to Kubernetes | WriteUpAn introduction to Kubernetes covering the basics of cluster creation and hardening.Jun 22Jun 22
AxolothTryHackMe | Snyk Code | WriteUpSecuring code with Snyk — a junior application security engineer’s journey.Jun 21Jun 21
AxolothTryHackMe | Snyk Open Source | WriteUpSecuring open-source dependencies with Snyk — a junior application security engineer’s journey.Jun 21Jun 21