Learn how hackers sometimes stumble upon weird security vulnerabilities and how you can too. Sometimes no matter how hard you try you just can’t find a vulnerability. See how exactly when that point was reached but how we pushed even further to achieve success.
How Hackers Steal PGP Keys
Learn how hackers steal your PGP keys. What may seem secure is not always so and hackers stealing PGP keys happens all the time. We are here to show you exactly how they get that done.
Automate Your Own CTF Solution
Learn how to code your own solution to CTF (Capture The Flag) exercises. After you manually solve a part of the capture the flag exercises you can then write a script that completes the exercise for you. Knowing scripting skills like this are extremely helpful.
How To Create A Social Media Keylogger
Learn how to create your own social media keylogger and by extension how to defend yourself from this kind of invasion of privacy.