In this part I'll keep it short and sweet and just cover how to get Searxng going and connected to OpenWeb-UI. So you want to comment out the following lines within the docker-compose.yml cap_drop: - ALL and then restart the stack: python3 start-services.py --profile=gpu-nvidia Once it's all up, remove the comments and restart it again. … Continue reading The quickest and simplest guide to spinning up a powerful local AI stack. Part 2 – SearXNG
Category: Information Security
The quickest and simplest guide to spinning up a powerful local AI stack. Part 1
As I delve deeper into AI, I got tired of the Jan's and LLM Studio. I have a handful of goals in mind, but of course to start it's important to get local stack. Thankfully the tool suites have exploded including docker composes. My goal after a prototype is RAG support. Anything like integrating Whisper, … Continue reading The quickest and simplest guide to spinning up a powerful local AI stack. Part 1
Complete Install Guide of Kali NetHunter on Nexus 6P – 2025
Simple and clear installation instructions to install Kali NetHunter onto a Nexus 6P (Angler) running Android 8.1 (Oreo).
CVE-2025-25727,CVE-2025-25728,CVE-2025-25729 Multiple Vulnerabilities found in BossComm OBD2 Tablet
Continuing my growth in the realm of hardware hacking, IoT and embedded penetration testing, I have purchased too many devices to perform some (mostly light) reverse engineering. Before going further, here are the required details for CVE references: CVE-2025-25727 Affected Product and Version: IF740 - Firmware Versions: 11001.7078 & 11001.0000 (Confirmed) & System Versions: 6.25 … Continue reading CVE-2025-25727,CVE-2025-25728,CVE-2025-25729 Multiple Vulnerabilities found in BossComm OBD2 Tablet
CVE-2025-25730 Developer Options and USB Debugging Authorization Bypass in Motorola Droid Razr HD (XT926)
Read about why and how I found CVE-2025-25730 - Developer Options and USB Debugging Authorization Bypass in Motorola Droid Razr HD (XT926)
Sniffing V2X/DSRC with LibreSDR B210/B220 AD9361 on Linux
Continuing with the last post, here's how to conifgure the LibreSDR B210/B220 to sniff V2X/DSRC traffic. First lets install some dependencies: sudo apt install gnuradio gnuradio-dev cmake libsndfile1 libsndfile1-dev Next lets follow this awesome GitHub Repo's instructions Now within GNURadio Companion open the following: /opt/gr-iee802-11/examples/wifi_phy_hier.gcr Now run it then exit GNURadio and reopen it. Now … Continue reading Sniffing V2X/DSRC with LibreSDR B210/B220 AD9361 on Linux
Setting up and configuring LibreSDR B210/B220 AD9361 on Windows and Linux
So for a large project I've spent a month or two on I've been delving deeper into embedded device hacking/penetration testing. I've done some hardware engagements and have messed a bit for fun before, but nowhere to this extent. As apart of these escapades I plan to make a bunch of posts of tips & … Continue reading Setting up and configuring LibreSDR B210/B220 AD9361 on Windows and Linux
ConfiguringWindows Subsystem Linux (WSL) to access USB devices.
Been a minute! Here's a quick walkthrough to setting up USB device sharing for your WSL distro. I know it's nothing fancy but I'm happy to be back to making some posts. Should be many more to come. TBH, I'm not a huge fan of WSL for daily use I prefer full VMs but a … Continue reading ConfiguringWindows Subsystem Linux (WSL) to access USB devices.
Sniffing Zigbee Traffic Easily with the M5NanoC6 2024
So I've recently been dabbling into more niche hardware/wireless/RF protocols (thanks flipper zero) which is definitely a subject I'm less knowledgeable in. Of course the first time I used aircrack-ng was well over a decade ago now and I messed with NRF when keysniff and mousejacking was first published as well as reading/researching about Bluetooth, … Continue reading Sniffing Zigbee Traffic Easily with the M5NanoC6 2024
CVE-2024-32210, CVE-2024-32211, CVE-2024-32212, CVE-2024-32213 LoMag (Integrator/CE) WareHouse Management
The post discusses the discovery of multiple CVEs in LoMag WareHouse Management, including hard-coded credentials, weak hash usage, and SQL injection vulnerabilities. The author provides insights into their discovery process and highlights the insecure coding practices in the application.






