Estimated read time 1 min read
IT

How to check your iPhone for Pegasus

High-risk users should be proactive in testing for signs of compromise Continue reading on Medium »    High-risk users should be proactive in testing for signs [more…]

Estimated read time 1 min read
IT

Hacking A Home Wireless Network

Read full article at: https://jenkins96.github.io/2024-11-07-Hacking-A-Home-Wireless-Network/ Continue reading on Medium »    Read full article at: https://jenkins96.github.io/2024-11-07-Hacking-A-Home-Wireless-Network/Continue reading on Medium » Read More Hacking on Medium  #hacking

Estimated read time 1 min read
IT

How To Automate Your Broad Scope Recon

Objective: To provide a comprehensive, automated reconnaissance methodology for web application hacking that combines Python and Bash… Continue reading on Medium »    Objective: To provide [more…]

Estimated read time 1 min read
IT

PG Practice — Boolean

This write-up details the process of gaining unauthorized access to a target machine as part of a Capture The Flag (CTF) exercise. The… Continue reading on [more…]