Hacking AI: Unlocking its Potential for OSINT Search & Investigations In the realm of artificial intelligence (AI) security, a burgeoning concept known as prompt hacking has emerged, posing significant challenges to the integrity and reliability of AI systems. Prompt ha... AI AI Osint Tools Artificial Intelligence ChatGPT Cybercrime OSINT Lookup OSINT Search OSINT Search Engines OSINT Search Tool Nov 25, 2023
Unleashing the Power of AI as an OSINT Tool: Revolutionizing Investigations The Importance of AI as an OSINT Tool Open Source Intelligence (OSINT) is a critical component of any intelligence gathering process. It involves the collection and analysis of publicly available info... AI AI Osint Tools Artificial Intelligence ChatGPT Osint Tools Oct 21, 2023
The Power of AI in Everyday Life Harness the Power of Multiple AI Tools, Simultaneously Artificial Intelligence (AI) has revolutionized our world in countless ways, enhancing efficiency, improving decision-making, and transforming in... AI Artificial Intelligence ChatGPT Cybersecurity Research Jul 14, 2023
The Acceleration of Cybercrime The rapid rise of cybercrime can be attributed, in part, to the reduced barriers of entry for malicious actors. Cybercriminals have adapted their strategies, even offering subscription services and st... AI Artificial Intelligence ChatGPT Cybercrime Cybersecurity Jun 20, 2023
The Ultimate OSINT Tools of 2023 In the dynamic realm of data-driven intelligence, Open Source Intelligence (OSINT) tools are the guiding light for extracting vital information. From threat hunting to investigative endeavors, these t... Automater Cylect.io Datasploit FOCA Maltego OSINT Recon-NG Shodan Social-Analyzer SpiderFoot TheHarvester Jun 7, 2023
Exploit Airlines that use T-Mobile for Free WiFi Objective: How to obtain free WiFi and maintain it while on an airplane. I had a long 14 hour flight back to the United States and ended up getting bored in the first 30 minutes. There I was, with a r... Airlines GoGoInFlight T-Mobile Vulnerability Feb 23, 2023
Hacking Blackhat What is Blackhat? Founded in 1997, Blackhat is an internationally recognized cybersecurity event series providing the most technical and relevant information security research. Grown from a single ann... Blackhat Red Team Vulnerability Oct 29, 2022
Honeypot Overview - Over half a million attacks in under 30 days. My Homelab Honeypot Honeypot Overview - Over half a million attacks in under 30 days. After being inspired by the research that comes out of the SANS Internet Storm Center with their Dshield Honeypot ... Honeypot T-Pot Vulnerability Aug 1, 2022
Security Observability with ThreatMapper ThreatMapper Overview - Security Observability for my homelab. Also works for linux, kubernetes, AWS fargate, and more. In my search for observability tools, I had stumbled upon ThreatMapper by Deepfe... AWS Kubernetes Shift Left Vulnerability Jul 5, 2022
All B Gone Watch - Turn off all the things. The Rise and Fall of my Samsung Gear 2 After owning a rooted Samsung Gear 2 since 2013 and turning off all of my friends TV's, random bars TV's, and Best Buy's TV's, to everyone elses joyous suprise a... Deauther IR Blaster TV-B-Gone May 5, 2022
Pi-Hole - A Poor Man's DNS Monitoring Tool Pi-Hole - A Poor Mans DNS Monitoring Tool DNS Overview The Domain Name System (DNS) is the phonebook of the interwebs, but with some caveats. Instead of paying your phone carrier to maintain your numb... DNS Monitoring Malicious Domains Pihole Sinkhole Apr 5, 2022
DoSla - Tesla Vulnerability Objective: Find a vulnerability in the Tesla Model 3 Vehicle. But how? The first start to any type of research project is to first do the research (do your homework). I started looking at all of the s... CVE-2020-10558 Tesla Vulnerability Nov 6, 2020