The Tor Project: Ensuring Anonymity Online
In an age where privacy and online security are paramount, the Tor Project stands as a beacon for those seeking anonymity on the internet. This blog post delves into the…
Ham Radio, Fun Facts, Open Source Software, Tech Insights, Product Reviews
In an age where privacy and online security are paramount, the Tor Project stands as a beacon for those seeking anonymity on the internet. This blog post delves into the…
Introduction In the ever-evolving world of technology, staying ahead of the curve requires continuous learning and access to the right resources. Whether you’re a seasoned IT professional, a budding developer,…
Metasploit is a powerful and versatile tool used primarily for penetration testing and security auditing. It is an open-source framework that provides information about known security vulnerabilities, which can be…
In the realm of cybersecurity, tools like the WiFi Pineapple have become indispensable for professionals and enthusiasts seeking to assess and fortify the security of wireless networks. However, the cost…
In the cybersecurity world, tools like the WiFi Pineapple Tetra are essential for professionals and enthusiasts alike. However, the cost can be prohibitive for some. Thankfully, Samy Younsi has provided…
In the realm of cybersecurity and penetration testing, tools like the WiFi Pineapple have become indispensable for professionals seeking to assess and fortify the security of wireless networks. However, the…
The History of Evil Twin Attacks Evil Twin attacks are a sophisticated type of Wi-Fi security threat where an attacker creates a fraudulent Wi-Fi network that mimics a legitimate one.…
The History of Burp Suite Burp Suite, developed by PortSwigger, has become a cornerstone in the toolkit of many cybersecurity professionals. Its journey began in the early 2000s when it…
In the realm of cybersecurity, the pursuit of innovative tools and techniques to bolster defenses is an ongoing saga. Enter Evil Crow RF, a revolutionary radiofrequency hacking device that promises…
Welcome to hamradio.my, where we explore the remarkable Flipper Blackhat, a WiFi hacking device designed to augment the Flipper Zero. With its open-source nature and powerful hardware, Flipper Blackhat not…
“Hello World. It was only a matter of time that the imagination of tech geeks, the curiosity of hackers, and the creativity at maker labs would come together and give…
In the ever-evolving landscape of cybersecurity and hacker culture, one device has captured the imagination of enthusiasts and professionals alike: the Flipper Zero. This compact, multifunctional tool has become synonymous…
In the realm of cybersecurity and penetration testing, tools are the unsung heroes of the trade. Among them, Flipper Zero has steadily emerged as a favorite among enthusiasts and professionals…
Introduction: In today’s blog post, we explore Hak5, a renowned company that has made significant contributions to the field of cybersecurity. Join us as we uncover the history, inventions, products,…
Introduction: Welcome to my tech blog, where we explore innovative devices and techniques. Today, we dive into the world of WiFi Hash Purple Monster, a powerful tool that captures EAPOL/PMKID…
Introduction: Welcome to hamradio.my, your trusted source for all things tech-related. In today’s blog post, we delve into the fascinating world of Pwnagotchi. This revolutionary tool has captured the attention…
After i read my friend’s post about flag6.pcap at UITM’s I-hack 2010, i wonder how can i find the answer which is “ariebelisthehottestfemaleparadin”. Yes i am a n00b, newbie, stupid,…
Congratulations to all winners
This modification of the Icom 706 MK IIG ( At Your Own Risk! ) will enable wide band transmit capability onHF, VHF and UHF bands. When modified the radio will…
Kevin Mitnick, also known as N6NHG in ham radio world was the most wanted computer criminal in United States history. He used his social engineering skills to bypass all the…