Rewanth Tammana is a security ninja, open-source contributor, and an independent consultant. Previously, Senior Security Architect at Emirates NBD (National Bank of Dubai). He is passionate about DevSecOps, Cloud, and Container Security. He added 17,000+ lines of code to Nmap (famous as Swiss Army knife of network utilities). Holds industry certifications like CKS (Certified Kubernetes Security Specialist), CKA (Certified Kubernetes Administrator), etc.
Rewanth speaks and delivers training at international security conferences worldwide including Black Hat, Defcon, Hack In The Box (Dubai and Amsterdam), CRESTCon UK, PHDays, Nullcon, Bsides, CISO Platform, null chapters and multiple others.
He was recognized as one of the MVP researchers on Bugcrowd (2018) and identified vulnerabilities in several organizations. He also published an IEEE research paper on an offensive attack in Machine Learning and Security. He was also a part of the renowned Google Summer of Code program.
Bachelors in Computer Engineering
National Institute of Technology, Kurukshetra, India
Notes for an extensive 2.5 hour workshop
Running a rootless container in a few lines of Go code with just linux syscalls
Vulnerable Banking Application for Android
Simple project that trains a model to detect phishing URLs.
Dictionary Attack on NIT Kurukshetra User-Portal (Cyberoam)
UI interface for drone CI/CD
Firefox browser extension which parses the headers of all the requests which are being flowing through your firefox browser to detect for vulnerabilities
Runs as validating admission controller to verify integrity of images
This kit automatically converts your firefox browser into a hacking tool by installing all the primitive hacker plugins
Improving the security audit logging in Harbor using OpenResty & change of architectural design
Plugin to parse and search fields from kubectl resources hierarchy tree
Plugin to create secrets with secure input prompt to prevent information leakages through terminal history, shoulder surfing attacks, etc
Kubernetes Goat is Vulnerable by Design Kubernetes Cluster. Designed to be an intentionally vulnerable cluster environment to learn and practice Kubernetes security.
Helm chart for Giant Swarm’s management of the Kyverno
Kubernetes Admission Controller Webhook Demo
Downloads mp3 file of a youtube video
Nmap - the Network Mapper. The swiss army knife network utility
My proposed solutions to a few full stack developer interview questions
This book aims to be the most straightforward guide to getting started with sigstore, software signing & securing supply chain security
A standalone exporter for vulnerability reports and other CRs created by Trivy Operator (formerly Starboard).
Annual technical fest website NIT Kurukshetra
Helm chart for Giant Swarm’s management of the Trivy vulnerability scanner
The Trivy operator automatically updates security reports in response to workload and other changes on a Kubernetes cluster & generating the reports
App for deploying the Aqua Security Trivy operator