Skip to content

scriptsntricks

scriptsntricks

  • News Letter
  • Contact
Security Tricks

Shielding Your Conversations: Inside CipherChat’s RSA-4096 Architecture

Poster January 8, 2026 No Comments

In an era of ubiquitous data harvesting, the best way to keep a secret is to ensure that no one—not even the service provider—can read it. Today, we’re looking at…

A.I Hacking Security Tricks

Mastering the Art of Deception: My Top Prompt Injection Attacks for AI Chatbots

Poster November 26, 2025 No Comments

As AI chatbots become more sophisticated, so does the art of security testing them. It’s a fascinating cat-and-mouse game where the mouse uses language itself to bypass the cat’s defenses.…

A.I Hacking Security

Streamlining Security Ops with Daily n8n + Ollama Automation

Poster November 17, 2025 No Comments

In today’s cyber‑security landscape, every hour brings new CVEs, breach alerts, and exploit posts. Manually filtering that noise is not only tedious—it’s risky. What I BuiltA 24‑hour batch pipeline using:…

Hacking Hardware Scripts Security

The “Tiny Titans” of RF Hacking

Poster September 25, 2025 No Comments

Flipper Zero (Unleashed Firmware) vs. LilyGO T‑Embed CC1101 (Bruce Firmware) If you’ve ever sat in a café, watched the Wi‑Fi traffic swirl around your laptop, or simply wanted to play with radio frequencies…

A.I Hacking Security

A.I, LLM’s, Hacking and why its should frighten you.

Poster September 18, 2025 No Comments

In the past decade we’ve seen the rise of Artificial Intelligence (AI), specifically Large Language Models (LLMs) such as GP4, Claude, LLaMA, and their open‑source cousins. While these models have…

Hardware Security Tricks

“GhostPhone” What is it? How to make one!

Poster June 11, 2025 No Comments

First lets talk about what is a “GhostPhone”, I have been seeing it a lot more lately and I want to clear somethings up. A “GhostPhone” is just a phone…

Security

Setting Up a T-Pot Honeypot: A Journey into Cyber Threat Intelligence

Poster April 8, 2025 No Comments

As cybersecurity threats become more advanced and persistent, defenders need ways to observe attackers in the wild—safely and legally. That’s where honeypots come in. Recently, I set up a T-Pot…

Uncategorized

Nice Try!

Poster March 5, 2025 No Comments

I know it use to be here not anymore 😀

Hacking

A Warning to Unauthorized Visitors: Stay Away from Our Website

Poster March 3, 2025 No Comments

To the people attempting unauthorized access to my website, This post is a direct warning to anyone trying to break into this site without permission. We’ve noticed multiple attempts to…

Hardware Raspberry Pi

HomeAssistant Voice

Poster March 3, 2025 No Comments

There’s a new player in the home automation space: Home Assistant Voice. It’s a more private solution, not connected to Google or Amazon. You can make one yourself, but it’ll…

Posts pagination

1 2 … 4

Next Page »

Recent Posts

  • Shielding Your Conversations: Inside CipherChat’s RSA-4096 Architecture
  • Mastering the Art of Deception: My Top Prompt Injection Attacks for AI Chatbots
  • Streamlining Security Ops with Daily n8n + Ollama Automation
  • The “Tiny Titans” of RF Hacking
  • A.I, LLM’s, Hacking and why its should frighten you.

Archives

  • January 2026
  • November 2025
  • September 2025
  • June 2025
  • April 2025
  • March 2025
  • December 2024
  • November 2024
  • August 2024
  • April 2024
  • June 2023
  • April 2023
  • February 2023
  • January 2023
  • December 2022
  • November 2022
  • October 2022
  • September 2022

Categories

  • A.I
  • Hacking
  • Hardware
  • Python
  • Raspberry Pi
  • Scripts
  • Security
  • Tricks
  • Uncategorized

You Missed

Security Tricks

Shielding Your Conversations: Inside CipherChat’s RSA-4096 Architecture

A.I Hacking Security Tricks

Mastering the Art of Deception: My Top Prompt Injection Attacks for AI Chatbots

A.I Hacking Security

Streamlining Security Ops with Daily n8n + Ollama Automation

Hacking Hardware Scripts Security

The “Tiny Titans” of RF Hacking

scriptsntricks

Copyright © All rights reserved | Blogarise by Themeansar.

Manage Cookie Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}