DIY Alexa Home Automation | Arduino Alexa Projects
In this post, I will show you how you can set up an Alexa Home Automation using Arduino. I will be giving you complete instructions including the circuit diagram, PCB files if you want to make a…
In this post, I will show you how you can set up an Alexa Home Automation using Arduino. I will be giving you complete instructions including the circuit diagram, PCB files if you want to make a…
ReelPhish – Defeating Two Factor Authentication using Real Time Phishing Attack Social Engineering Human Beings and their vulnerabilities have always been one of the loop holes in IT security. Even though the technology; software, networks and hardware,…
DIY Photoshop editing Console using Arduino Nano RP 2040 – In this Arduino HID project, I will be showing you can use an Arduino as a HID to send Photoshop shortcuts to your computer and edit photos easily.
Remote Controlled Tank This time I have a rough Terrain Robot with 4 Wheel Drive and dedicated suspension for it to travel over rough terrain. Check it out. Why not build one for yourself? Here we will…
Crypto Currency Mining Mother Boards There are tons boards which are said to be highly efficient in mining that are available in the online market but choosing the right one can be a bit unsettling. After a…
A 17 year old Vulnerability in Microsoft Word was disclosed recently tracked by CVE-2017-11882 which affected the major versions of Microsoft Office – Microsoft Office 2007 SP 3, Microsoft Office 2010 SP 2, Microsoft Office 2013 SP…
What is OWASP? OWASP or Open Web Application Security Project is an unbiased open source community focusing on improving the security of web applications and software. OWASP, formed as wide group of like minded people has now grown…
Information Security Consulting company TrustedSec has announced a HTTP(s) command and control (C2) Open Source Framework dubbed TrevorC2. This is a client-server model for masking out Command and Control using a normally browsable website. Detection of this…
WiFi and WPA Now a days, every offices, houses, hotels, parks, hospitals, almost everywhere there is wifi. But the real question is, are they secure?If your wireless access point is not properly secured, people from other houses,…
A new tool – BLEAH which is used for attacking Bluetooth Low Energy devices is now available for download in evilsocket repository. This can be used for perform sniffing and man in the middle attack. What makes…
Kali Linux has been one of the best penetration testing OS of all time. During April 2017, Kali Linux 2017.1 rolling was released and the popular distro came up with a set of significant updates and features which…
We spend a lot of time going through sites, trying to find out the latest stable download link for various hacking tools. Even after successful download, installing/updating dependencies is another headache. A new bash script is available…
Enter your account data and we will send you a link to reset your password.