> 

CorruptCache - Andrew Knowles's Application Security Portfolio and Blog

USER_PROFILE: [BIO]

Every line of code is a potential doorway. To secure it, you have to understand it. I leverage my background in software engineering to specialize in application security. This site is my public commit log: a collection of deconstructed vulnerabilities and secure code patterns.

STATUS_LOG: [CURRENT]

đźš§ Currently exploring using ai to develop websites faster!

MEDIA_LOG: [COMPLETED]

Recently Read:

  • "Atomic Habits" by James Clear
  • "Naked Statistics" by Charles Wheelan

Recently Played:

  • God of War (2018)
  • Resident Evil 4 Remake
  • Bomb Rush Cyberfunk
  • Balatro

LATEST_POSTS: [FROM THE BLOG]

Why I Put My Smart Devices in a Digital Cage: My Homelab Build

A detailed walkthrough of building a home lab to reclaim data privacy and digital ownership, moving from a pile of salvaged parts to a full-fledged digital fortress with VLANs, OPNsense, and self-hosted services.

Read More →

More Than Packets: How the Network+ Made Me a Better Application Security Engineer

A deep dive into how understanding networking fundamentals with the CompTIA Network+ certification can transform a developer into a more effective Application Security Engineer.

Read More →

Let's Connect

I'm always open to discussing new projects, creative ideas, or opportunities to be part of your vision.

DEPLOYMENTS

Building is the best way to learn how to break. These projects are my proving grounds—explorations in both constructing and securing applications. You'll find everything from personal code experiments to collaborative builds.

Secure Home Lab & Network Segmentation

A comprehensive home lab built to reclaim data ownership and create a secure, segmented network for IoT devices and security experiments.

OPNsense UnRAID Docker VLANs Jellyfin Unbound DNS
COMING SOON

CI/CD Security Pipeline

A complete CI/CD pipeline template using GitHub Actions that incorporates static application security testing (SAST) and software composition analysis (SCA).

COMING SOON

Cloud Threat Modeling Dashboard

A web-based application that allows teams to collaboratively create and manage threat models for their software projects using the STRIDE methodology.

MOTIVATION

A cat named Bob.
Bob
A cat named Tiny.
Tiny