Yadav667Security Best Practices for API keySome APIs use API keys for authorization. An API key is a token that a client provides when making API calls. The key can be sent in the…2 min read·Feb 1, 2021----
Yadav667Buffer Overflow OverviewBuffers are memory storage regions that temporarily hold data while it is being transferred from one location to another. A buffer…4 min read·Jan 15, 2020----
Yadav667DISTRIBUTED DENIAL-OF-SERVICE PROTECTION — AWSA Distributed Denial of Service (DDoS) attack is a malicious attempt to make a targeted system, such as a website or application…2 min read·Dec 26, 2019----
Yadav667How to Create a Strong PasswordPasswords are your first line of defense against cybercriminals — some tips and best practices for creating strong passwords.2 min read·Dec 20, 2019----
Yadav667Pool of Resources for OSCPDuring my prep for OSCP , i have gone through a lot of exhaustive knowledge sharing blogs, git repos etc.2 min read·Oct 29, 2018----
Yadav667Malware Analysis ResourcesRecently i was exploring about malware analysis and i got pretty good list of the resources. So i thought of sharing so that, if anyone…14 min read·Aug 6, 2018--1--1
Yadav667Resources for WEB APPLICATION PENETRATION TESTINGWeb Application Penetration Testing5 min read·Jul 22, 2018----
Yadav667Security Guidelines to keep in mind — For developersHere is a list of default security requirements that I would suggest for most software development projects:3 min read·Jul 20, 2018----