Explore Articles

Blog

Deep dives into web development, hacking, AI, and cutting-edge technology.

Evil Twin Wi-Fi Attack

Learn how Evil Twin Wi-Fi attacks work and how to perform one using Airgeddon on Kali Linux. Covers lab setup, captive portal creation, credential capture, and how to protect yourself.

10 min readSumit Pathak
Read more

Wi-Fi Hacking Guide

Understand the basics of Wi-Fi and how to attack WiFi — covering WEP cracking, WPA/WPA2 handshake capture, deauthentication attacks, evil twin attacks, KRACK, and best practices to secure wireless networks.

15 min readSumit Pathak
Read more

C# Execution via JScript

DotNetToJScript exposes a key enterprise security gap by enabling fileless, in-memory code execution through trusted Windows script engines, bypassing application whitelisting.

11 min readSumit Pathak
Read more

Showing 6 of 17 posts · Page 1 of 3