Home

Blog

Visualisations

About Me

My Repos

The Manager's Desk

Kickstart Career

Disclaimer

  • (AppSec) End-to-End API Security Lifecycle

    MAY 15, 2025 - 10 MIN READ

  • (DNS Security) – Building a Resilient DNS Infrastructure

    MAY 13, 2025 - 11 MIN READ

  • (Threat Model) - STRIDE Threat Modelling - In-Depth Practical

    APR 29, 2025 - 30 MIN READ

  • (ASM) Decision Tree to Identify Potential/Confirmed Abandoned/Unmaintained External Applications

    MAR 25, 2025 - 1 MIN READ

  • (ASM) Free/Open-Source External ASM Toolkit

    FEB 20, 2025 - 3 MIN READ

  • (CTI) Threat Intelligence Information Sharing

    FEB 7, 2025 - 4 MIN READ

  • (Bug-Bounty) Master XSS Hunting Methodology

    FEB 3, 2025 - 2 MIN READ

  • (Bug-Bounty) How to Know You are Ready for Full-Time Bug Bounty

    JAN 17, 2025 - 13 MIN READ

  • (SIEM) SIEM Query Knowledgebase Document Template

    JAN 12, 2025 - 2 MIN READ

  • (CTI) Navigating the R.O.A.D. from Threat Intelligence to Detection Rules

    JAN 2, 2025 - 17 MIN READ

  • (VAPT) JWT Pentest Checklist

    DEC 31, 2024 - 1 MIN READ

  • (CTI) Dead Drops: Threat Actor Perspective

    DEC 30, 2024 - 4 MIN READ

  • (CTI) - Bringing External and Internal Intel Data Together

    DEC 26, 2024 - 0 MIN READ

  • (VM/ASM) - GAP comparision In Traditional VM/ASM

    DEC 25, 2024 - 3 MIN READ

  • (VM) - Mind Your Vulnerability Gaps: Risk-based VM Approach

    DEC 25, 2024 - 3 MIN READ

  • (CTI) - CTI Maturity Model

    DEC 24, 2024 - 9 MIN READ

  • (CTI) - How to Build Cyber Threat Intelligence Division For Your Organisation

    DEC 24, 2024 - 3 MIN READ

  • (CTI) - VIP Monitoring in Threat Intel - Part 3

    DEC 24, 2024 - 0 MIN READ

  • (CTI) - VIP Monitoring in Threat Intel - Part 2

    DEC 24, 2024 - 1 MIN READ

  • (CTI) - VIP Monitoring in Threat Intel - Part 1

    DEC 24, 2024 - 1 MIN READ

Home


© Chintan Gurjar - chintangurjar@outlook.com