Vulnerability Analysis Blog
Practical guides on vulnerability analysis, penetration testing, and DevSecOps workflows.
Articles
-
Security Analysis of a Python Job Application Tracker
Applying real-world vulnerability assessment techniques — threat modeling, OWASP mapping, CVSS prioritization — to a personal Python project built with SQLAlchemy, Gmail API, and Dash.
-
How I Analyze Vulnerabilities Using Tenable
A real-world walkthrough of scanning, triaging, and remediating vulnerabilities with Tenable Vulnerability Management and Nessus.
-
Using OWASP Top 10 for Vulnerability Analysis
How to integrate the OWASP Top 10 framework into vulnerability analysis workflows for prioritization, risk scoring, and remediation planning.
-
Metasploit Framework for Vulnerability Analysis & Exploitation
Using Metasploit to validate vulnerabilities, execute exploits, and assess real-world impact during penetration testing engagements.
-
Setting Up Wazuh on a Proxmox Server
Step-by-step deployment of Wazuh on Proxmox for unified security monitoring, vulnerability detection, and compliance auditing.
-
Nmap Scanning Techniques for Vulnerability Reconnaissance
A practical walkthrough of using Nmap for network reconnaissance, service enumeration, and vulnerability detection as part of a penetration testing workflow.
-
Burp Suite for Web Application Penetration Testing
Using Burp Suite to intercept traffic, manually test for OWASP Top 10 vulnerabilities, and validate web application security findings.