Sethu SatheeshExploiting Firestore Database Rules: A Pathway to Data BreachesIntroduction4d ago4d ago
Sethu SatheeshFunny Hacking i’ve done #2: I Owned Every Possible Account of Over 500+ Victims#Social_Engineering part 3Apr 271Apr 271
Sethu SatheeshBluetooth hacking #3: Interacting with Bluetooth Low Energy DevicesHello guys, my name is Sethu satheesh, i am a cyber security researcher and a software engineer. Welcome back to our third part of…Apr 10Apr 10
Sethu SatheeshBluetooth hacking #2: Sniffing Bluetooth Low Energy communicationHello guys, my name is Sethu satheesh, i am a cyber security researcher and a software engineer. This is our second part of Bluetooth…Mar 31Mar 31
Sethu SatheeshBluetooth Hacking: A Guide for Cyber Security Enthusiasts #1Hey guys, my name is Sethu Satheesh, a cyber security researcher and a software engineer. In this write up we are going to dive into the…Mar 301Mar 301
Sethu SatheeshTesting a mass social engineering scam through GitHub: I owned 1000+ accounts#Social_Engineering part 2. (Part 1: Click Here)Mar 16Mar 16
Sethu SatheeshThe Funniest Hacking that I’ve done: Turning Pranks into Profits !Hello guys, my name is Sethu satheesh, i am a cyber security researcher and a software engineer. I am going to take you on a ride through…Feb 41Feb 41
Sethu SatheeshHacking Printers : Unveiling the Risks of Printer & IoT HackingHey guys, my name is Sethu Satheesh, a cyber security researcher and a software engineer. In this write up we are going to dive into the…Feb 3Feb 3
Sethu SatheeshLock Picking: From a Pentester’s point of viewHey fellow enthusiasts… my name is Sethu satheesh, a cyber security researcher and software engineer. Today let’s dive into a crazy topic…Dec 27, 2023Dec 27, 2023