Posts

How to get into a wifi network without a password

Lab review

Are there examples of any "Good Viruses"?

How Attackers Are Actually Getting In

Command Execution via Drag-and-Drop in Terminal Emulators

[VulnPath Update] New Feature: "My Tech Stack"

Hacking Google Random Number Generator (Part 2)

Vercel confirms breach as hackers claim to be selling stolen data

Before Mythos ruins vulnerability research for everyone. Here is a list all the CVE's I found (with some exploits).

Advice

Someone’s impersonating someone I know on X

Post-Quantum Cryptography Migration at Meta: Framework, Lessons, and Takeaways