Have you ever wondered how IoT and other hardware manufactures debug and test their devices.… Read the post5-Min Tutorial: Gaining Root via UART
So lately I've been involved on a lot more Hardware and IoT hacking than usual.… Read the post5-Min Tutorial: Lifting Firmware with the Bus Pirate
To those not on the field, the word 'Cryptography' seems to be surrounded by some… Read the postDemystifying Cryptography
If you have ever used the free Wi-Fi provided by hotels, airports, or even starbucks.… Read the postBreak Free! - Bypassing Captive Portals
K-Means Clustering is a common machine learning tool that allows to separate data into "clusters"… Read the post5-Min Tutorial: K-Means Clustering In Python
A couple of weeks ago, inspired by a friend, I decided to build a small… Read the postCoding Chrome Extensions Quickly
[ This is the sequel to Chapter 1: Clogger || Pylogger is now available at Github]… Read the postCapture The Keys - Chapter 2: Pylogger
So lately I've been diving in deep on the security world. I just started working… Read the postPenTesting 101: Setting up your lab
This past quarter I was enrolled in a class CS162 at UCSB called "Programming Languages".… Read the post5-Min Tutorial: Caesar Cipher in Scala
While taking CS56 - Advanced Java Applications Programming at UCSB, I decided to write a… Read the postAndroid Tutorial