The first addition, a awesome 4G LTE router that runs a flavor of OpenWRT, anti-forensics blue merle plugin and supports CBRS bands (aka the $150 private LTE network). First documented case of this being supported!
Tag: Whitehat Hacking
The quickest and simplest guide to spinning up a powerful local AI stack. Part 3 – Image Generation via Stable Diffusion
So as this is the first part that integrates things that aren't included out of the box, I'm going to build these parts out separately and then at the end I'll release my full docker-compose.yml which will have all the pieces. With that in mind, lets get started. First you should go to your users … Continue reading The quickest and simplest guide to spinning up a powerful local AI stack. Part 3 – Image Generation via Stable Diffusion
NTLM and SMB: File Sharing is Caring
Old paper I wrote about SMB/LM/NTLM/NETNTLM/SAM/Passing the hash and more. All for the copium.
Unbricking and Reflashing the Ubertooth One Clones
Purchased a Ubertooth One Clone from Amazon or Aliexpress that doesn't seem to be working in 2025? Bricked your Ubertooth One? This step-by-step guide shows how to recover it using UART flashing, fix common issues, and verify full Bluetooth sniffer functionality.
ConfiguringWindows Subsystem Linux (WSL) to access USB devices.
Been a minute! Here's a quick walkthrough to setting up USB device sharing for your WSL distro. I know it's nothing fancy but I'm happy to be back to making some posts. Should be many more to come. TBH, I'm not a huge fan of WSL for daily use I prefer full VMs but a … Continue reading ConfiguringWindows Subsystem Linux (WSL) to access USB devices.
CVE-2024-32210, CVE-2024-32211, CVE-2024-32212, CVE-2024-32213 LoMag (Integrator/CE) WareHouse Management
The post discusses the discovery of multiple CVEs in LoMag WareHouse Management, including hard-coded credentials, weak hash usage, and SQL injection vulnerabilities. The author provides insights into their discovery process and highlights the insecure coding practices in the application.
Fields of Study Within Offensive Cyber Security 2021
Read about the fields of study within offensive cyber security 2021.
How to install NetHunter on Any Android Phone (Nexus 6p) 2021
Complete instructions on how to install kali nethunter on any android device updated for 2021!
Top 10 Books for Penetration Testers and Hackers 2021 Part 1
Top 10 books for any hacker, penetration tester, bug bountier or more!
The importance of Operation’s Security 2020
Operations security (OpSec) is UBER important. Whether you're on the blue, red, purple team. Whether you wear a white, gray or black hat!








