Hacking made easy with XSSIFY 💉Inviting all hackers, bug bounty hunters nd cyber security enthusiasts to checkout our new tool 🔥Jan 91Jan 91
The Art of Hacking Vending MachinesLet’s grab some snacks by breaking into the vending machines, but without touching it. Here’s your guide for hacking vending machines…Oct 13, 202412Oct 13, 202412
Getting Started With OT Security: Understanding OT Security Challenges (Part 3)Welcome back to the next chapter of “Getting Started with OT Security” series! If you’re just joining us, you might want to catch up on…Oct 4, 2024Oct 4, 2024
Encountering a professional Scam Group 🤘Here's a tale of my personal experience on encountering a professional scam group. Go-ahead, enjoy the story and be aware of the ongoing…Sep 19, 20241Sep 19, 20241
Getting Started With OT Security: Understanding OT Protocols (Part 2)Hey, tech enthusiasts!Aug 12, 20241Aug 12, 20241
Let’s Hack Some Robots 🤖Bored of hacking websites & applications? Let's start hacking robots...Aug 8, 2024Aug 8, 2024
How Cybercriminals Exploited the CrowdStrike Outage: A Deep DivePicture this: you’re at the peak of your productivity when suddenly, your computer throws a tantrum and crashes into a Blue Screen of…Jul 23, 2024Jul 23, 2024
Getting Started with OT Security: Fundamentals You Need to Know (Part 1)Hey there, fellow tech enthusiasts!Jul 6, 2024Jul 6, 2024
IDORs Never Disappoint Me — Hacking Into Online Bookings ($$$$)Hey there, fellow hackers and security enthusiasts! This blog is a walkthrough about my recent experience uncovering an IDOR vulnerability…Jun 27, 20242Jun 27, 20242
IoT Pentesting: MQTT 101 with Lab Setup and ExploitationEver wondered how secure your smart fridge or…Jun 14, 2024Jun 14, 2024