About:

Because Google started to delete hacking related blog posts without using a single brain cell, I had to learn just another framework. Thx Google

Website:

Specializations:

Outgoing Links:

Brian Krebs
Subscribe to RSS:
The blog post discusses a security vulnerability (CVE-2025-44251) in the Ecovacs Deebot T10, where the device exposes users' Wi-Fi credentials during the pairing process with the mobile app. The issue arises from the device creati...
The blog post discusses a security vulnerability in EKEN group’s video doorbells, specifically the T6 model, which sends debug logs containing sensitive information, including Wi-Fi SSID and credentials, to EKEN cloud servers via ...
The text discusses the effectiveness of personal VPN services, arguing that they are not necessary for the average internet user and comparing them to homeopathic medicines. It delves into the security and privacy concerns, conclu...
The author discusses their dissatisfaction with Google services and their decision to migrate their blog to Jekyll and Github pages. They outline the challenges and time-consuming process of the migration, including issues with fo...
The author reflects on their long history with Google and YouTube, expressing frustration with the removal of their hacking-related content and the deletion of their videos. They discuss their use of Gmail and Blogger, and their d...

0My WHCD experience

2020-09-10

The author shares their experience taking the White Hat Certified Defender course exam, discussing the challenges they faced and the lessons they learned from the experience.
The text is a detailed account of the author's experience with RastaLabs, a red teaming lab. The author describes the challenges faced, the support received, and the skills gained during the lab. The lab is praised for its realist...
The blog post provides a quick start guide for beginners on how to hack the Hacktivity 2018 badge. It includes detailed instructions for Linux, macOS, and Windows users on how to connect the badge to their computers and communicat...
The post discusses the history and evolution of cheating in PC games, focusing on freemium games. It explains different types of cheats, the challenges of cheating in modern games, and the use of tools like CheatEngine to hack gam...
The article discusses the concept of 'burner devices' and the misconceptions surrounding it. It explains the real threats and risks when traveling, and provides advice on how to mitigate these risks. The author concludes that buil...
The author shares their experience of recovering data from an old encrypted Time Machine backup stored on a WD MyCloud NAS. They faced difficulties in accessing the backup and found the solution using hdiutil command.
The author discusses the WADA hack and presents evidence to argue that Russia was not behind it. They point out weak evidence and inconsistencies in the analysis, and suggest that the hack was done by non-professional hackers paid...