m5kroHow to Sail the High SeasLooking for movies, TV shows, or games, but don’t want to pay a dime? Here’s a guide on how you can find such treasures quickly, safely…Jun 18Jun 18
m5kroinCyberScribersFrieren: Open Source WiFi Pineapple AlternativeIf you clicked on this article you’ve probably heard of the WiFi Pineapple before. For those who don’t know the WiFi Pineapple is a…Jun 13Jun 13
m5kroGiving AI Full Access to the TerminalWith the rise of LLMs and other AI tools, it’s given that many people would use them for automating tasks. One major interest for this is…May 9May 9
m5kroinCyberScribersUsing Burp Suite to Analyze POST DataBurp Suite is a set of advanced tools used to analyze websites. From scanners to fuzzers Burp has it all. In this article, we’ll review the…Mar 22Mar 22
m5kroFauxPilot vs Other Self Hosted AI Coding AssistantsA few months back I reviewed FauxPilot, a self hosted AI coding assistant that ran on docker. Overall it was an okay experience but it’s…Jan 151Jan 151
m5kroinCyberScribersCloud Computers for HackingCloud computing has been around for a while now. There are offerings from many big tech companies and it's very cheap, sometimes free, to…Nov 13, 2023Nov 13, 2023
m5kroOne Year On MediumIt’s been a year since I published my first article on Medium, let’s see how things went.Sep 30, 2023Sep 30, 2023
m5kroinCyberScribersDNS PoisoningDNS poisoning is the act of intercepting DNS requests and sending spoofed responses. This can be done as most DNS requests are sent in…Sep 10, 2023Sep 10, 2023
m5kroinCyberScribersKali vs Parrot vs AthenaThe operating system is an integral part of cybersecurity. Each one offers different tools and functions catering to different people. In…Aug 18, 2023Aug 18, 2023