Access_Denied1997Identity Aware Proxy for Securing GCP Applications: Part 02In the previous part, we explored how to secure Google Cloud Platform (GCP) applications using Identity Aware Proxy (IAP) with URL-Map and…3 min read·Feb 25, 2024----
Access_Denied1997Identity Aware Proxy for Securing GCP Applications: Part-01If you’re looking for secure, reliable application protection, look no further than Identity Aware Proxy using URL-Map and Custom Backend…5 min read·Dec 7, 2023----
Access_Denied1997Implementing Your Cloud Security Posture Management Using Open Source Tools: Part-01In today’s digital landscape, businesses are increasingly reliant on cloud computing to power their operations. The flexibility…3 min read·Sep 6, 2023----
Access_Denied1997Tutorial Part-01: How to do open source license compliance , open source security risk assessment…Introduction:4 min read·Nov 26, 2022----
Access_Denied1997Critical Android Accessibility API used frequently by Malware Authors:PART-01Accessibility API was created for disable people now it is going to use by malware authors a lot. Using it, you can create an app that…3 min read·Nov 19, 2022----
Access_Denied1997Various Threats/Attacks in Machine Learning and AI Model DevelopmentIntroduction:7 min read·Aug 28, 2022----
Access_Denied1997Browser Fingerprinting using Clientinfo Module/ToolHi Everyone this is a quick tour how to develop Browser Fingerprinting module/tool using Java script. Before going to give quick tour of…9 min read·Feb 7, 2021----
Access_Denied1997Modify any “External Android library/Aar/Jar” Using Jadx (Java Decompiler) and Recaf (ByteCode…Hi everyone this is a tutorial how to create modified external android library, before going to give the step by step guide to do this…3 min read·Jan 24, 2021--1--1
Access_Denied1997Universal SSL HTTP Traffic Decrypt bypass Android with FRIDAHi Everyone this is a tutorial how to decrypt SSL HTTP traffic in android. Before going to give the step by step guide to do this. let us…4 min read·Jan 2, 2021--1--1