Practice Hacking Skills with OWASP Juice Shop Practice your hacking skills with the OWASP Juice Shop, a modern yet insecure web application.
Phishing Attack Simulation with Gophish A step-by-step guide to phishing attack simulation and employee awareness using Gophish.
How to Set up Your Own Blog using Ghost on Railway A step-by-step guide to setting up your own blog for free using Ghost on Railway.
Immutable Transparency Logs with Sigstore Rekor A step-by-step guide on creating an immutable ledger and storing transparency logs with Sigstore Rekor.
Sign Software Artifacts with Sigstore Cosign A step-by-step guide on signing code and software artifacts with Sigstore Cosign.
Discover Intrusions with Canarytokens A brief on discovering intrusions in your network and systems using canarytokens.
Generate SBOMs for Container Images using Syft A brief on generating SBOMs (software bill of materials) for container images using Syft.
What is SBOM? A brief on software bill of materials, or SBOM, and why it is important to software supply chain security.
How to Deploy Caddy Server on DigitalOcean App Platform A step-by-step guide to deploying Caddy Server on DigitalOcean App Platform.
How to Deploy a Static Website with Caddy on Railway A step-by-step guide to deploying a static website with Caddy Server on Railway.