PinnedI Turned My Laptop Into a Forensics Case Study: Here’s What I FoundFrom Disk Imaging to Wireshark — A Full-Scale Self-Investigation Using Free Tools and Keen ObservationMay 30May 30
PinnedExposing an OAuth Token Weakness in Amazon’s Mobile App: A Responsible Disclosure JourneyHow a Simple Burp Suite Interception Revealed Serious Risks in Token Handling and User PII ExposureJun 13Jun 13
PinnedPentesting My Roku TV: A Quiet Attack Vector in the Living RoomMy First Attempt at Hacking an IoT DeviceMay 9A response icon2May 9A response icon2
PinnedFrom Divine to Demonic: The Evolution of Perceptions of Power and AuthorityAug 15, 2024Aug 15, 2024
Fantasy Hub: The Android Trojan Turning Telegram Into a Hacker MarketplaceThe Android ecosystem has always been a playground for innovation — and, unfortunately, for exploitation. The latest threat making waves…1d ago1d ago
So, I Decided to Pentest Amazon’s Echo Dot — Here’s What I FoundConsumer IoT devices like the Amazon Echo Dot have become a common appliance in modern households — always listening, always ready, and…Jul 11Jul 11
Cyber Sabotage in the Shadows: Are Infrastructure Failures a Sign of a Digital Cold War?As tensions nears a fever pitch between Israel, Iran, and the United States, there’s a chilling undercurrent that cybersecurity…Jun 27Jun 27
How to Set Up MobSF with Docker on Kali Linux for Mobile App Penetration TestingMobile Security Framework (MobSF) is one of the most powerful open-source tools for mobile app security assessment, supporting both static…Jun 4Jun 4