Building a Secure Bitcoin Cold Storage SolutionIn the ever-evolving world of cryptocurrency, security remains a paramount concern, especially when it comes to safeguarding Bitcoinβ¦Aug 20Aug 20
How to hack ANY wireless keyboard in less than 30 seconds (Concept)If you have access to your victimβs keyboard for a short time, you can use this concept to install an invisible key logger and injector.Oct 3, 2022Oct 3, 2022
How Laravelβs EncryptCookies middleware prevented me from hacking our applicationToday I tried to hack into our Laravel application trough a blind SQLi vulnerability I discovered in our code. I was able to retrieve theβ¦Aug 30, 20222Aug 30, 20222
How I hacked my first Twitter web challenge πIt was Saturday morning when I checked Twitter on my phone and saw the following tweetβ¦Aug 20, 20221Aug 20, 20221