PinnedPublished inInfoSec Write-upsCode Deobfuscation in the age of AIDiscover in this article how OpenAI can be used to help security researchers in reverse engineering malware code.Jun 27, 2023Jun 27, 2023
PinnedPublished inFAUN — Developer Community 🐾Unleash the full power of automation with self-service Internal Developer PortalsDiscover why you want to have an IDP and what are the key features to look into in order for it to be successfulApr 9, 2023Apr 9, 2023
Quick hack: Host your personal password protected Notion website for 1 cent/moNotion is one of the most famous platform where you can easily build amazing portfolios and easily share them to showcase your projects. If…Jul 20, 2023Jul 20, 2023
Pills of Golang — Arrays and SlicesIf you’re just getting started with Go, you may have heard about two similar-sounding data types called “arrays” and “slices”. At first…May 1, 2023May 1, 2023
Injecting Secrets in GKE with Secret ManagerApplications need to read secret values to connect for example to a database, or to call an API. Provisioning these secrets in Kubernetes…May 5, 20212May 5, 20212