Really… A Challenge??

Really... A Challenge?? Taking the Challenge shown in the movie Snowden There will be no scripts included in this post, if you are someone who knows about networking, Linux and python you should be easily able to replicate or rebuild the scripts explain in this post....

Facebook Spam

Facebook "Spam" DoS Using Spam to Spam and Crash FB Messenger 2018 Some may look at the Tittle and think ohhhh they found a way to do a Denial of Service (DoS) by some new fancy spearphishing attack… well you would be 100% amazing and...

Self Repairing Server

Self Repairing Server Automated Self Repairing Server Using Jenkins Automation The original project was designed around the idea of having a training environment for new employees to the Red Team, the idea was to give them a safe place to practice skills in a variety...

Voice Recognition Attack Vector

Voice Recognition Attack Vector An Attack Vector design based on the idea of a viral marketing campaign by Burger King The Theory Software advances in Voice Recognition continue to improve as does the list of applications from commercial answering machines with help...

Hacking Via Dance

Hacking Via Dance The Absolutely Craziest Proof Of Concept for an Attack Vector I have ever taught up  While I was in TheManyHatsClub voice call one Friday night, one of the other members of the call that goes by Chrissy Morgan was talking about a talk they submitted...

Hacking UnHackable GSA Readers

Hacking Finger Print Readers Breaking GSA Certified Finger Print readers model FUTRONIC Finger Print Scanner  model: FS88   Avilable to purchase from the following location: https://www.bayometric.com/futronic-fs88-fips201piv-usb-2-0-fingerprint-scanner/ So as...