The “Tiny Titans” of RF Hacking
Flipper Zero (Unleashed Firmware) vs. LilyGO T‑Embed CC1101 (Bruce Firmware) If you’ve ever sat in a café, watched the Wi‑Fi traffic swirl around your laptop, or simply wanted to play with radio frequencies…
Flipper Zero (Unleashed Firmware) vs. LilyGO T‑Embed CC1101 (Bruce Firmware) If you’ve ever sat in a café, watched the Wi‑Fi traffic swirl around your laptop, or simply wanted to play with radio frequencies…
In the past decade we’ve seen the rise of Artificial Intelligence (AI), specifically Large Language Models (LLMs) such as GP4, Claude, LLaMA, and their open‑source cousins. While these models have…
First lets talk about what is a “GhostPhone”, I have been seeing it a lot more lately and I want to clear somethings up. A “GhostPhone” is just a phone…
As cybersecurity threats become more advanced and persistent, defenders need ways to observe attackers in the wild—safely and legally. That’s where honeypots come in. Recently, I set up a T-Pot…
I know it use to be here not anymore 😀
To the people attempting unauthorized access to my website, This post is a direct warning to anyone trying to break into this site without permission. We’ve noticed multiple attempts to…
There’s a new player in the home automation space: Home Assistant Voice. It’s a more private solution, not connected to Google or Amazon. You can make one yourself, but it’ll…
These are two raspberry pi zero w projects that seem the same but are very different. The pwnagotchi is an AI powered deauther that tries to get the handshake between…
I came across this bypass on x.com. I wish I could remember who made the post but to whom ever you are shout out to you. If you are ever…
First what is card skimming? Its when a malicious actor (bad guy) places a device that copies the data from your card. How can we fight against it. Well we…