Home
Chirpy
Cancel

Ready for take-off

Prologue Yet another technical blog. Does the world need another one of those, really? Isn’t that just a fad from the 2000’s that got away now that we have RSS, Medium or Wordpress? Most tech blo...

Live backups with btrfs

Intro: Backup and restore with btrfs snapshots Most tutorials and guides out there around btrfs focus on snapshots as a way to recover missing data on the same machine. Some guides explain how to...

Evil twin attack

This tutorial will guide you through the process of compromising a computer in your LAN. The author gives this example for educational purposes and does not incentivise you to apply these techni...

Man in the middle attack

This tutorial will guide you through the process of compromising and phishing a computer in your LAN. The author gives this example for educational purposes and does not incentivise you to apply...

Trying out an android Remote Access Trojan (RAT)

This tutorial will guide you through the process of infecting Android phones with a trojan. The author gives this example for educational purposes and does not incentivise you to apply these tec...

Exfiltrating data from a bank

This tutorial will guide you through the process of bypassing security procedures from your employer. The author gives this example for educational purposes and does not incentivise you to apply...

A simple trojan for Linux

This tutorial will guide you through the process of infecting Linux based computers with a trojan. The author gives this example for educational purposes and does not incentivise you to apply th...

A simple click-jacking exercise

This tutorial will guide you through the process of doing cross site scripting. The author gives this example for educational purposes and does not incentivise you to apply these techniques with...

Web 3.0

When you think of cryptocurrencies what is the first thing that comes to your mind? For some it might be digital gold, fast, reliable and cheap transaction fees. For others it will sound more along...

A simple phishing exercise

This tutorial will guide you through the process of writing a phishing website. The author gives this example for educational purposes and does not incentivise you to apply these techniques with...