The Power of AI in Everyday Life Harness the Power of Multiple AI Tools, Simultaneously Artificial Intelligence (AI) has revolutionized our world in countless ways, enhancing efficiency, improving decision-making, and transforming in... AI Artificial Intelligence ChatGPT Cybersecurity Research Jul 14, 2023
The Acceleration of Cybercrime The rapid rise of cybercrime can be attributed, in part, to the reduced barriers of entry for malicious actors. Cybercriminals have adapted their strategies, even offering subscription services and st... AI Artificial Intelligence ChatGPT Cybercrime Cybersecurity Jun 20, 2023 Cybersecurity Blog
The Ultimate OSINT Tools of 2023 In the dynamic realm of data-driven intelligence, Open Source Intelligence (OSINT) tools are the guiding light for extracting vital information. From threat hunting to investigative endeavors, these t... Automater Cylect.io Datasploit FOCA Maltego OSINT Recon-NG Shodan Social-Analyzer SpiderFoot TheHarvester Jun 7, 2023 Cybersecurity Blog
Exploit Airlines that use T-Mobile for Free WiFi Objective: How to obtain free WiFi and maintain it while on an airplane. I had a long 14 hour flight back to the United States and ended up getting bored in the first 30 minutes. There I was, with a r... Airlines GoGoInFlight T-Mobile Vulnerability Feb 23, 2023 Cybersecurity Blog
Hacking Blackhat What is Blackhat? Founded in 1997, Blackhat is an internationally recognized cybersecurity event series providing the most technical and relevant information security research. Grown from a single ann... Blackhat Red Team Vulnerability Oct 29, 2022 Cybersecurity Blog
Honeypot Overview - Over half a million attacks in under 30 days. My Homelab Honeypot Honeypot Overview - Over half a million attacks in under 30 days. After being inspired by the research that comes out of the SANS Internet Storm Center with their Dshield Honeypot ... Honeypot T-Pot Vulnerability Aug 1, 2022 Cybersecurity Blog
Security Observability with ThreatMapper ThreatMapper Overview - Security Observability for my homelab. Also works for linux, kubernetes, AWS fargate, and more. In my search for observability tools, I had stumbled upon ThreatMapper by Deepfe... AWS Kubernetes Shift Left Vulnerability Jul 5, 2022 Cybersecurity Blog
All B Gone Watch - Turn off all the things. The Rise and Fall of my Samsung Gear 2 After owning a rooted Samsung Gear 2 since 2013 and turning off all of my friends TV's, random bars TV's, and Best Buy's TV's, to everyone elses joyous suprise a... Deauther IR Blaster TV-B-Gone May 5, 2022 Cybersecurity Blog
Pi-Hole - A Poor Man's DNS Monitoring Tool Pi-Hole - A Poor Mans DNS Monitoring Tool DNS Overview The Domain Name System (DNS) is the phonebook of the interwebs, but with some caveats. Instead of paying your phone carrier to maintain your numb... DNS Monitoring Malicious Domains Pihole Sinkhole Apr 5, 2022 Cybersecurity Blog
DoSla - Tesla Vulnerability Objective: Find a vulnerability in the Tesla Model 3 Vehicle. But how? The first start to any type of research project is to first do the research (do your homework). I started looking at all of the s... CVE-2020-10558 Tesla Vulnerability Nov 6, 2020 Cybersecurity Blog