Something that piqued my interest earlier in my cybersecurity studies was wireless attacks on vehicles. A friend reached out claiming her car had been broken into, sans keys. And... she had video of it. I had heard the reports and I had read a few articles. But I had never had a chance to see … Continue reading Wireless Attack Vectors Against Automobiles
Category: Information Security
Introducing Sherlock GPT Holmes
Started my journey into LLMs and AI. While I do some real work with Jan AI, I created a custom GPT. Might add some custom functionality but if not, it's still useful for offensive cyber security! I made sure it tries to do what you ask first and always offer to generate code for you … Continue reading Introducing Sherlock GPT Holmes
New Project: The Hackers Lunch Box
Been a long time! Just wanted to stop by and let y'all know I've created a new project on the GainSec GitHub! It's called The Hackers Lunch Box. Here's the description: High level attack and finding maps for all your penetration testing, hacking, bug bounty and red teaming needs! To be more specific, this is … Continue reading New Project: The Hackers Lunch Box
10 Minutes of Google dorking for Covid Documents
So stoked to reveal that my article submission was published in the latest Unredacted magazine publication! Ik they received hundreds of submissions so to be chosen is just awesome! Check it out on page 34 HERE END TRANSMISSION
CVE-2022-34615, CVE-2022-34621, CVE-2022-34623, CVE-2022-34624 – IDOR, User Enum and More (In Mealie)
Multiple new CVEs discovered and disclosed! IDOR, User Enum, invalid session termination and a weak password policy!
How to install Veracrypt on Kali Linux
How to install, use and uninstall Veracrypt on Kali Linux.
Under Utilized Tools/Resources #85
A one-stop shop for post exploitation? Including privilege escalation? Definitely worth checking out!
Under Utilized Tools/Resources #84
A new tool for exploring/exploiting misconfigurations in FireBase datastores!
Under Utilized Tools/Resources #83
A nice list of people search engines/resources for any use OSINT user!
Under Utilized Tools/Resources #82
A google dork for finding exposed cpanel accounts



