
From breaking things to building solutions… explore my journey through tech, security, and innovation.
Lorem ipsum dolor sit amet, cons ctetur adipisng elit, seled do iumd tempor incidnt uhgt labore reliut dolore magna aliqua.
AWS, GCP, Azure, REST APIs
Python, JS, .NET, PostgreSQL, MongoDB
MITRE ATT&CK, Cyber Kill Chain, SIEM
This article walks through setting up a safe lab environment to experiment with all three types of SSH tunneling. By recreating realistic scenarios, you’ll learn how to use local, remote, and dynamic port forwards to securely access hidden services, expose local tools, and pivot traffic through a SOCKS5 proxy.
GrapheneOS depends on Pixel devices because they uniquely combine Titan M security chips, strong hardware attestation, and seven years of updates. With Android 16 making hardware support harder to access, the project faces new challenges that highlight how tightly privacy-focused Android forks are bound to Google’s ecosystem.
One of the fastest ways to uncover hidden files and directories on a target is by combining Gobuster with high-quality wordlists. In this tutorial, we’ll install SecLists on Kali Linux and walk through practical examples of using it to supercharge your reconnaissance.