“GhostPhone” What is it? How to make one!
First lets talk about what is a “GhostPhone”, I have been seeing it a lot more lately and I want to clear somethings up. A “GhostPhone” is just a phone…
First lets talk about what is a “GhostPhone”, I have been seeing it a lot more lately and I want to clear somethings up. A “GhostPhone” is just a phone…
As cybersecurity threats become more advanced and persistent, defenders need ways to observe attackers in the wild—safely and legally. That’s where honeypots come in. Recently, I set up a T-Pot…
I know it use to be here not anymore 😀
To the people attempting unauthorized access to my website, This post is a direct warning to anyone trying to break into this site without permission. We’ve noticed multiple attempts to…
There’s a new player in the home automation space: Home Assistant Voice. It’s a more private solution, not connected to Google or Amazon. You can make one yourself, but it’ll…
These are two raspberry pi zero w projects that seem the same but are very different. The pwnagotchi is an AI powered deauther that tries to get the handshake between…
I came across this bypass on x.com. I wish I could remember who made the post but to whom ever you are shout out to you. If you are ever…
First what is card skimming? Its when a malicious actor (bad guy) places a device that copies the data from your card. How can we fight against it. Well we…
HashCat is hash cracking software that can be used on Windows, Mac and Linux. What is a hash? you might be asking. A hash is an encryption method to store…
It has been a while since I made a new post. I believe that security and personal privacy is a must in this day and age, but it is harder…