The Art of Hacking Vending MachinesLet’s grab some snacks by breaking into the vending machines, but without touching it. Here’s your guide for hacking vending machines…Oct 138Oct 138
Getting Started With OT Security: Understanding OT Security Challenges (Part 3)Welcome back to the next chapter of “Getting Started with OT Security” series! If you’re just joining us, you might want to catch up on…Oct 4Oct 4
Encountering a professional Scam Group 🤘Here's a tale of my personal experience on encountering a professional scam group. Go-ahead, enjoy the story and be aware of the ongoing…Sep 191Sep 191
Getting Started With OT Security: Understanding OT Protocols (Part 2)Hey, tech enthusiasts!Aug 121Aug 121
Let’s Hack Some Robots 🤖Bored of hacking websites & applications? Let's start hacking robots...Aug 8Aug 8
How Cybercriminals Exploited the CrowdStrike Outage: A Deep DivePicture this: you’re at the peak of your productivity when suddenly, your computer throws a tantrum and crashes into a Blue Screen of…Jul 23Jul 23
Getting Started with OT Security: Fundamentals You Need to Know (Part 1)Hey there, fellow tech enthusiasts!Jul 6Jul 6
IDORs Never Disappoint Me — Hacking Into Online Bookings ($$$$)Hey there, fellow hackers and security enthusiasts! This blog is a walkthrough about my recent experience uncovering an IDOR vulnerability…Jun 272Jun 272
IoT Pentesting: MQTT 101 with Lab Setup and ExploitationEver wondered how secure your smart fridge or…Jun 14Jun 14