Iโve participated in various high level complex CTF challenges, some of which landed me interviews at companies that had them as a part of their hiring process such as: โSecurity Innovationโ, โBrainnest Consultingโ, as well as โChip Scanโ. I also do a bunch of platforms like HackTheBox and TryHackMe, as well as the many 6 that are available on โCanyouhack[.]usโ which was provided by โSecurity Innovationโ. Iโm also a Pico CTF competitor, and have even done a few high level forensics challenges that involve high level cryptanalysis techniques to decipher hidden data, as well as rebuild, analyze, and compile them. All of the CTFโs Iโve participated in inspired me to create my own known as โFutabaโs Playgroundโ - The Hacker Who Laughs ๐ธ๐ธ๐๐๐ธ๐ธ
This is the final tier for all of my regular patreon content that isn't apart of my mentorship tiers. THERE ARE NO LIMITED SPOTS FOR THIS! It's heavily focused on Cyber Security content and is where my main follower should subscribe if they wish to gain access to highly exclusive content. This will be one of the main tiers I invest a lot of benefits into. * You get 2 day early access to any and all non-excluisve updates before they are announced on all of my platforms! * Members of this tier will receive a more advanced version of any and all articles that are released. This means that you get access to exclusive stuff like: exploit guides, videos, including any programming videos if they are set for it that non-patreons won't get. * Members of this tier will receive 1 additional EXCLUSIVE article on top of the 2 that are set to launch bi-weekly, which will sample some of the main material that will be in my mentorship program when it launches. That way you get to see if you would like the content for it BEFORE you buy it! This includes any and all exploit videos and guides that happen to come with it! * Members of this tier will receive 1 additional EXCLUSIVE article on top of the 2 that are set to launch bi-weekly, which will sample some of the main material that will be in my mentorship program when it launches. That way you get to see if you would like the content for it BEFORE you buy it! This includes any and all exploit videos and guides that happen to come with it! * You get access to โlightโ mentorship, where you can ask me any direct questions about the material that is included in this tier. This also includes anything from the FREE material as well! If there is something that you donโt understand, simply message me via discord or LinkedIn and Iโll answer them for you. THIS DOES NOT INCLUDE THE IN DEPTH MENTORSHIP THAT WILL BE APART OF MY MAIN PROGRAM! This is another testing ground to let you see if you like my teaching style BEFORE you join my program. - The Hacker Who Laughs ๐ธ๐ธ๐๐๐ธ๐ธ
A new version of my FREE samples will be launching soon! There will be a new system, as well as a new mailing list that you will use to gain access! In order to gain access to it, you will have to review my products! In order to gain access to it, you will have to review my products! There will be a total of 5 resources available each month If you happen to be subscribed to my patreon tier YOU get to vote on which samples get chosen each month based on a poll I will make available! * You get access to โlightโ mentorship, where you can ask me any direct questions about the material that is included in this tier. This also includes anything from the FREE material as well! If there is something that you donโt understand, simply message me via discord or LinkedIn and Iโll answer them for you. THIS DOES NOT INCLUDE THE IN DEPTH MENTORSHIP THAT WILL BE APART OF MY MAIN PROGRAM! This is another testing ground to let you see if you like my teaching style BEFORE you join my program. - The Hacker Who Laughs ๐ธ๐ธ๐๐๐ธ๐ธ
I wrote a test sample to demonstrate how ransomware targets and infects a victim system via file enumeration and disk encryption tactics such as RSA and AES encryption. For this test specifically I am only using RSA encryption. The code basically creates a directory with a series of files with a bit of sample data in them, creates crypto keys to use for the experiment, enumerates and locates all the root files in the folder, and then handles them via encrypting the files, showing you the cipher text, and then reversing the process to decrypt it in front of you. It even tests the keys by asking you to input data when it launches so that you see the program works. - The Hacker Who Laughs ๐ธ๐ธ๐๐๐ธ๐ธ
I've always wanted to have one of my rubber ducky scripts write its own code In a cool way, so I figured why not combine that with a LAN turtle. I'm even working on a version of this that acts as retro malware to disable security systems in place, allowing me to install any backdoor. - The Hacker Who Laughs ๐ธ๐ธ๐๐๐ธ๐ธ
I wrote a Man-In-The-Browser exploit that is able to sit in place via the use of exceptions to monitor and track end user browser sessions to keylog facebook credentials from the end user. I ran into a HUGE issue during trial and error with the code. Whenever the end user would clickoff off the page, the code would be unable to find the form elements, breaking the code. What I NEED it to do is, when the end user leaves the page, or should they be on the same site but the code canโt find the elements, is for the for loop to break, bringing us back to the main while loop so that the process to check for sites begins again. To get around this I set up an exception handler. - The Hacker Who Laughs ๐ธ๐ธ๐๐๐ธ๐ธ
This is a TCP Client that I wrote that connects to a server in a listening state on a victim machine, that can check the OS and version of the system, and then install and run payloads I set based on that, even tools that I might need to pwn the system. Iโm upgrading this in the future to combine data encryption to mask my network traffic on internal networks to stay hidden for exploits. - The Hacker Who Laughs ๐ธ๐ธ๐๐๐ธ๐ธ
This is a TCP Server that I wrote that listens on a victim machine for TCP Client side connections, so that it can interpret and handle any and all shell code commands that are sent by the botmaster. Iโm upgrading this in the future to combine data encryption to mask my network traffic on internal networks to stay hidden for exploits. - The Hacker Who Laughs ๐ธ๐ธ๐๐๐ธ๐ธ
This is a script that I designed that solves one of โSecurity Innovationsโ first SQL injection based CTFโs. The script is able to inject a payload into the URL parameter of the web server while pre-loading a cookie session that has been assigned to it, solving the challenge, and storing the results for us in a file, in which we can parse through to check for the flag. - The Hacker Who Laughs ๐ธ๐ธ๐๐๐ธ๐ธ
This is a custom portable CTF server that I wrote in: HTML/CSS/JS, and PHP. Further languages used are SQL for the backend of the database which is MYSQL. The server is designed to allow you to pentest wherever you are locally vs the traditional meas of having to be connected to the internet in order to engage in web application pentesting CTF challenges, allowing you to get practice wherever you are on the go. Itโs also home lab friendly and allows you to practice network penetration testing as well, and includes a variety of challenges that test a lot of your hacking methodology and skill sets. Youโre going to have to apply yourself and LEARN if you want to secure all โ11 flagsโ. You can run this challenge as either locally on your system, or on another system that you can run either directly or vm machine. This makes it more accessiible to all users. If you have nethunter you can also participate in the challenge as well from you phone if you wanted to try mobile hacking. THIS DOES RUN ON NETHUNTER AS WELL THE SAME WAY. YOU NEED TO MAKE SURE YOU ARE ROOT WHEN YOU RUN NETHUNTER SO THE SCRIPT WORKS CORRECTLY OTHERWISE IT WILL CRASH AND FAIL! - The Hacker Who Laughs ๐ธ๐ธ๐๐๐ธ๐ธ
Iโve included a safe UDP backdoor to run that only works on one system via 2 terminals. Iโve excluded the full version for safety purposes that utilizes TCP/IP in order to allow for remote data communication between said systems on the networks. Feel free to check out the SSH version. Iโve also created my own personal MITB(Man in the browser attack) program, that will launch a total โrealโ chrome browser (read the code in the description to download the module needed to run the program), which will keep track of any sites written in the code, and will log it down into a text file. For safety purposes it only tells you whether you visited the site or not. Iโve also written my own personal RSA encryption/decryption tool you can use to secure data. The program has a manual mode Iโve written that will explain how to use it. I primarily use python to program a series of low-level networking tools: Client/Servers via TCP, UDP, and SSH, HTML and flask Servers, as well as network sniffers to scan and monitor traffic on networks by sending UDP packet datagrams to wait for responses and see what machines I can talk to, as well as interacting with a variety of different network protocols. I also use python to develop: Encryption/Decryption tools, Man in the browser attack programs, mapping web applications, web brute forcing, as well as to develop trojan programs that I can update and communicate with on different systems, as well as for SQL injection attacks. Iโm learning machine learning with python at the moment, and I do also use it to develop fast GUIโs for pentesting tools using PYQT5. - The Hacker Who Laughs ๐ธ๐ธ๐๐๐ธ๐ธ
This is an interchangeable rubber ducky script I wrote designed to run and execute various payloads. For demonstration purposes Iโve provided a safe version of the code you can run and script onto an arduino board that utilizes a micro USB port (The arduino Keyboard library only works with those types of boards). Simply load up the arduino program and sketch โKeyboardInjectionLINUX.inoโ to the board and the sample code will run. Iโve also included a set of functions in a text file, that you can use to edit and swap out functions in the original code should you wish to. Have fun!!! - The Hacker Who Laughs ๐ธ๐ธ๐๐๐ธ๐ธ
This is a second build of a penetration testing app I've developed that is meant to automate a variety of the different tools I've written. The interface only includes code that has been fully tested thoroughly. Any others, feel free to browse and look at it. You won't see it in the interface but it's there in case you wish to see it. The following to look at first are: Bash_Interface.py (This is the main interface) LinuxInstall.py (Installs all needed components, including PYQ5 in case you don't have it installed. Also compatible with windows via pip installer) Installer Module.sh(Script that will install all needed compilers for Linux should you not have them installed) - The Hacker Who Laughs ๐ธ๐ธ๐๐๐ธ๐ธ
Inspired by Marcus's drone from Watch Dogs 2 and as a tribute to the series, I'm developing a penetration testing drone, it's sole purpose, to fly around capturing packet data, as well as cracking Wireless encryptions, integrating the use of a raspberry pi zero to host my UDP BackDoor Server program in order to communicate with the drone and see what's on the pi as it's flying. Think of it as a flying wifi-pineapple. When the drone boots up, the pi zero will auto login, where a set of scripts will run, starting up the UDP Server. The flight controller for the drone is built up from scratch, rather than using a pre-built one. The drone will take a series of commands from the transmitter, the controller, also built from scratch (keyboard input option available as well), and depending on the value read from the analog of the joystick module, will move the drone either: forward, backward, left, right, up down, and shifts the values of the signal values sent to the ESC's of the drone in order to move the drone accordingly, all calibrated properly. The drone is still in prototype phase, and is near completion. In the future I will be diving into how to facial recognition software, which I will build from scratch in order to build a true replica of Wrench from Watch Dogs 2, his face mask that acts as a build board, where his facial expressions are scanned by the mask in order to display a a set of emojis that show his emotions. - The Hacker Who Laughs ๐ธ๐ธ๐๐๐ธ๐ธ
For today's software engineering content, we are going to dive into how to write out form requests to implement various HTTP methods from scratch, as well as how to setups basic HTML file from scratch. I will be showing you how to setup form requests, as well as: text inputs, password inputs, submit modules, and lastly, file uploads for an html page. The goal of this, is to get you into the habit of knowing how HTML code works and how to tamper with it. Pay close attention to how I'm writing the code, as you'll need to know this for the upcoming lab that is set to launch soon. Source code, like always, will be in the attachments section bellow. Disclaimer As always, personal disclaimer, any and all information for this is strictly for educational purposes and I do not condone any form of illegal activity, nor am I responsible for anything you should use this information for. DO NOT pen-test on anyone's network unless it is your own, or you have permission to do so. Now, letโs begin! - The Hacker Who Laughs ๐ธ๐ธ๐๐ธ๐ธ
Today, Iโm going to cover how to program an RF module with arduino in order to send radio waves from one radio module to another. This is going to come majorly into play for the next lab that I have set, as well as one of the biggest projects in the long run, so do pay close attention to how I am writing the code for it. Donโt forget that how to set up any and all modules takes place during the major lab that will be combining all the parts together. The goal for all of this is to get you used to how to write the code, and then we dive into how to physically set all of it up which is the fun hands on part that you all know and love. Disclaimer As always, personal disclaimer, any and all information for this is strictly for educational purposes and I do not condone any form of illegal activity, nor am I responsible for anything you should use this information for. DO NOT pen-test on anyone's network unless it is your own, or you have permission to do so. Now, letโs begin! - The Hacker Who Laughs ๐ธ๐ธ๐๐ธ๐ธ
Today, Iโm going to talk about WAP security and why itโs important for you to implement it for both home networks, ESPECIALLY HOME NETWORKS, as well as corporate infrastructures. We often overlook this, which can lead to a MASSIVE SPOF that can lead to a massive scaled botnet if weโre not careful with implementing proper WAP endpoint security measures. I specialize in networking overall so I have a lot of fun messing around with penetration testing regarding them. Iโm also going to talk a bit about the various creative ways threat actors can exploit an access point to do some serious damage and a lot more. Of course *whistles* Iโm just theorizing. Itโs not like Iโve been paid to do this stuff before right hahaโฆ. *cricket noises*.. AHEMโฆ back to the point of the matter! Iโm also going to talk about what SPOF is since itโs a CRITICAL topic that youโll often come across in Cyber and Information security, WHICH YOU NEED TO KNOW. Itโs so important that simply not knowing it is one of the MAIN reasons why we have so many security breaches and bad Cyber Security practices. Lastly, since this is of course the danger series, I am going to address MANY remedies that can be done in order to enhance your overall network security, most of which you probably have never thought of in the first place. Iโve played around with a lot of this stuff, so do take my word for it. This article is a part of the Danger! Series, which is where I raise more Cyber Security awareness about critical flaws and vulnerabilities that exist within various system infrastructures, including any protocols and data communication methods, and the Dangers of what could happen should they be exploited to the fullest extent. I also go over various mitigation strategies that can be used to prevent them as well. If by chance there is an exploit video for me showing the full potential risk, it will be included in the advance version of this article for PAID patreon members only! Disclaimer As always, personal disclaimer, any and all information for this is strictly for educational purposes and I do not condone any form of illegal activity, nor am I responsible for anything you should use this information for. DO NOT pen-test on anyone's network unless it is your own, or you have permission to do so. Now, let's begin! - The Hacker Who Laughs ๐ธ๐ธ๐๐ธ๐ธ
Today Iโm going to address a hot topic, one that has been going around lately since itโs innate birthโฆ WILL A.I. REPLACE US? Iโm going to basically debunk some of the most popular reasons why, and why itโs just another tool that will aid us in our daily lives. Iโm also going to talk a bit about what A.I.is and how it compares to actual human intelligence since the overall goal of it is to replicate the human mind. Iโm also, lastly, going to discuss the BIGGEST downfall that has been leading to a lot of FAILED expectations to be met from A.I, and how the overall introduction of it has affected the overall job market. Recently with the development of OpenAI, which lead to stuff like ChatGPT, weโve entered a more advanced era of A.I., where it can do a bit more than just โHey Siriโ, or โHey Alexaโ, and query and search stuff for us and return the results. โA.Iโhas progressed to the point where itโs able to do ACTUAL stuff like: generate images for us, write our resume and cover letters, generate basic code templates, generate animations, etc. I think you get the picture! BUT, donโt be misled by what you see on paper. Not everything translates well. Iโm also going to talk about why I donโt like A.I., which is mostly due to the FALSE image that it has implanted in our minds and WHY Iโm enjoying itโs slow and inevitable downfall. Iโm a HUGE tech enthusiast, and am VERY open minded to many implementations of it. Tech has advanced society to limits that I wouldnโt have imagine possible, which also lead to it HELPING a lot of people overall, as well as made things more accessible for the disabled: prosthetics, eye care, hearing impaired, etc, the list goes on. Typically technology BENEFITS EVERYONE and has a POSITIVE effect (ahemโฆ I know what youโre thinking just go with it haha), but in the case of A.I, it has lead to the false impression of a utopia that simply WILL NEVER EXIST! One where the robots will do all the work for us so we can just sit back and relax and prosper from it. We looked only a the short term of A.I. and not the long term, and because of that, we are PAYING a hefty price for it. Itโs being used to REPLACE us, NOT HELP US. Lastly, Iโll also be covering a few HUGE security risks and COPY right laws that come into factor regarding it. This article is a part of the Danger! Series, which is where I raise more Cyber Security awareness about critical flaws and vulnerabilities that exist within various system infrastructures, including any protocols and data communication methods, and the Dangers of what could happen should they be exploited to the fullest extent. I also go over various mitigation strategies that can be used to prevent them as well. If by chance there is an exploit video for me showing the full potential risk, it will be included in the advanced version of this article for PAID patreon members only! Disclaimer As always, personal disclaimer, any and all information for this is strictly for educational purposes and I do not condone any form of illegal activity, nor am I responsible for anything you should use this information for. DO NOT pen-test on anyone's network unless it is your own, or you have permission to do so. Now, letโs begin! - The Hacker Who Laughs ๐ธ๐ธ๐๐ธ๐ธ
Today I am going to show you how to write your own custom reveshell script that can perform RCE on any system. This is taking inspiration from reveddshells which have a series of RCE shells that you can download and interact with that will allow you to seamlessly achieve RCE for any remote file upload exploit. Why am I covering this despite there being a site that allows you to do so? Well, much like all things involving hacking youโll run into situations where you need to write more complex code, even code that is pre-made beforehand for an exploit which might go out of the scope of what you need said program to do. This is also due to the fact that various detection systems are able to identify signature patterns. If you know how to write your own code you can apply further obfuscation methods that will allow you to bypass security. I am also going to show you how the code works under the hood so that you have a CLEAR understanding of how it works and how to write it yourself. This WILL be in the lab upcoming, so I recommend you get good with this as the REAL exploit for the next lab is going to be a lot more complex. Disclaimer As always, personal disclaimer, any and all information for this is strictly for educational purposes and I do not condone any form of illegal activity, nor am I responsible for anything you should use this information for. DO NOT pen-test on anyone's network unless it is your own, or you have permission to do so. Now, letโs begin! - The Hacker Who Laughs ๐ธ๐ธ๐๐ธ๐ธ
Today Iโm going to show you how to write your own SSH client via Python that you can use to connect to ANY SSH service and pipe in commands to the server. The main little goal of this exercise is to teach you how the SSH protocol works under the hood. What you do with this information, which like all things, can also be used for hacking. I will also eventually be covering how to write your one SSH server which can come in handy. The issue with this is there have been reports of people having issues with the module working. Disclaimer As always, personal disclaimer, any and all information for this is strictly for educational purposes and I do not condone any form of illegal activity, nor am I responsible for anything you should use this information for. DO NOT pen-test on anyone's network unless it is your own, or you have permission to do so. Now, letโs begin! - The Hacker Who Laughs ๐ธ๐ธ๐๐ธ๐ธ
For todayโs tool video, Iโm going to show you how to use the smbclient tool in order to sniff out and exploit smb file shares on windows systems to retrieve a sensitive file that contains password end user credentials. File shares are one of the most CRITICAL end points to protect on any system. Thereโs a reason why OS systems CLOSE their ports by default on most systems. Should a threat actor be able to breach the service, they will have access to any and all file shares on the system, as well as being able to upload and replace and or tamper with files within the FTP service. This can lead to a lot more complex exploits like living off the land for example. Disclaimer As always, personal disclaimer, any and all information for this is strictly for educational purposes and I do not condone any form of illegal activity, nor am I responsible for anything you should use this information for. DO NOT pen-test on anyone's network unless it is your own, or you have permission to do so. Now, letโs begin! - The Hacker Who Laughs ๐ธ๐ธ๐๐ธ๐ธ
For todayโs tool video, Iโm going to show you how to use wireshark to sniff out network traffic to spy on sensitive credentials that are sent, and WHY you should NEVER use a site unless it has HTTPS enabled on it. Be mindful, just because a site does have HTTPS enabled doesnโt mean itโs safe and secure. Threat actors tend to have phishing sites that enable the protocol to trick us into thinking itโs legit. The wireshark tool, which is used for network traffic analysis, can also be used for a variety of protocol analysis, even for stuff like VOIP eavesdropping, which can allow you to spy on peopleโs phone call conversations over corporate networks. Iโll eventually cover stuff like that in future parts involving the tool later on. Disclaimer As always, personal disclaimer, any and all information for this is strictly for educational purposes and I do not condone any form of illegal activity, nor am I responsible for anything you should use this information for. DO NOT pen-test on anyone's network unless it is your own, or you have permission to do so. Now, letโs begin! - The Hacker Who Laughs ๐ธ๐ธ๐๐ธ๐ธ
Today I'm going to show you how to program servo motors in arduino. The main goal is to โsimulateโ and show you how programming them for drones work under the hood. Iโll of course leave the working code attached. Just pay attention to how I write the code and go about the overall process and youโll be fine. For this demonstration Iโll be covering how to program them via the standard ones that come with the arduino kit. Iโll also show you how to program them via ESC motors for the drone. Disclaimer As always, personal disclaimer, any and all information for this is strictly for educational purposes and I do not condone any form of illegal activity, nor am I responsible for anything you should use this information for. DO NOT pen-test on anyone's network unless it is your own, or you have permission to do so. Now, letโs begin! - The Hacker Who Laughs ๐ธ๐ธ๐๐ธ๐ธ
Today Iโm going to show you how to program LCD screens. This is staple if you get crafty and want to program CUSTOM stuff like *cough* visualizers that print your emojis to the screen. Iโll be showing you how to program TWO versions of LCD screens that youโll commonly see in the arduino kit for beginners. 1 of them is the standard one with MANY pin connectors attached to them which can be the most complex to setup. The other is one that is commonly and easily interchangeable which includes a ISC adapter attached to them which is seamless to install and program. I recommend knowing how to program both of them so you can make either work in case you are running short on supplies, OR, in the event you ONLY have one or the other. None the less itโs still staple to know how to program BOTH of them. Disclaimer As always, personal disclaimer, any and all information for this is strictly for educational purposes and I do not condone any form of illegal activity, nor am I responsible for anything you should use this information for. DO NOT pen-test on anyone's network unless it is your own, or you have permission to do so. Now, letโs begin! - The Hacker Who Laughs ๐ธ๐ธ๐๐ธ๐ธ
Todayโs exploit video will feature something that has been HEAVILY requested by many of my followersโฆ BINARY injection, also known commonly as a Buffer Overflow exploit. Much like how SQL injection is hard to learn without proper instruction, so is binary injection. What Iโm going to show you today is the overall premise and concept behind the technique. This is the DEFINITIVE example and BEST way to EASILY explain how binary injection works to ANYONE that wants to learn more about it. Binary is overall one of the HARDEST techniques to learn and master mostly due to there being FEW GOOD resources that can teach it to you. Iโm also going to write some sample code in C that will be vulnerable to buffer overflow attacks, so that you can play with it and get a feel for how it works on a technical level. This will also set us up for the next part, which will be me covering how to use a debugger to analyze the code flow, as well as perform the overall exploit the manual way. There are more special surprises for binary injection coming up so do stay tuned. As always, any and all videos that are included with this article will be for PAID members only! You can check out my tiers and pricing down in my patreon link in the comment section below as well as on my website. Disclaimer As always, personal disclaimer, any and all information for this is strictly for educational purposes and I do not condone any form of illegal activity, nor am I responsible for anything you should use this information for. DO NOT pen-test on anyone's network unless it is your own, or you have permission to do so. Now, letโs begin! - The Hacker Who Laughs ๐ธ๐ธ๐๐ธ๐ธ
Today, Iโm going to dive further into binary injection exploits, and cover how to exploit them for RCE, remote code execution. Iโm also going to show you how to use one of the most common tools that is used to analyze code flow as well as binary applications overall which is the GDB debugger. Iโll explain a bit about what that is as well. Last time, I showed you how to exploit vulnerable functions inside of a program via end user input in order to call other functions within the program via memory EVEN if the function is NEVER explicitly called in the program itself. This was to highlight the dangers of leaving vulnerable code within an application and how it can be exploited by threat actors to execute it which can be problematic if youโve left stuff like backdoors in the code that the threat actor can easily piggyback off of to compromise internal infrastructures. This time around, we are going to take it a step further and exploit the overall application to have it perform ANY form of RCE that we want against a target application whether it be in plain text format or binary format. This is a CRUCIAL skill to master, as youโll often run into various CTF challenges that require you to know binary exploitation, as well as overall in general if you are running some security tests. It overall comes in handy if youโre just a hacker in general and is a STAPLE skill to master. Youโll go a long way, ESPECIALLY if you plan to do forensic with this skill set. Disclaimer As always, personal disclaimer, any and all information for this is strictly for educational purposes and I do not condone any form of illegal activity, nor am I responsible for anything you should use this information for. DO NOT pen-test on anyone's network unless it is your own, or you have permission to do so. Now, letโs begin! - The Hacker Who Laughs ๐ธ๐ธ๐๐ธ๐ธ
For today's software engineering content, I'm going to teach you how to program form pages.
This week, I'm going to show you how to program your very own RF module for arduino.
Today, Iโm going to talk about why WAP security and why itโs important for you to implement it.
Today Iโm going to address a hot topic regarding A.I. which is long overdue.
Today I am going to show you how to write your own custom reveshell script in PHP.
Today Iโm going to show you how to write your own SSH client in Python3 with Paramiko.
For todayโs tool video, Iโm going to show you how to use wireshark to capture password data.
Today I'm going to show you how to program servo motors in arduino for drones.
Today Iโm going to show you how to program LCD screens with Arduino including ISC.
Todayโs exploit video will feature something HEAVILY requestedโฆ BINARY injection.
Today, Iโm going to dive further into binary injection exploits and cover RCE with it.
For todayโs tool video, Iโm going to show you how to use smbclient to exploit file shares.