MatejsmyckaMFA Only With Windows Hello and Apple ID? Time for Linux-ID!You no longer have to use TOTP tokens on Linux; now, you can get the same user experience as on other operating systems — it’s time to…May 27May 27
MatejsmyckaRead Code Like a Hacker With SASTReading code manually is a time-consuming process. It is also error-prone, as it is easy to miss important details. As developers and…May 12May 12
MatejsmyckaRed Team Phishing: Experience using sing Evilginx2 and GoPhishI’d like to share my experiences using evilginx2 and gophish for red teaming phishing simulations.May 12May 12
MatejsmyckaHacking a Nintendo Switch for 30$Switch hacking community can be confusing and elitist for newcomers, so I wrote an overview of various sources to provide a better…May 12May 12
MatejsmyckaGuide: ProjectDiscovery’s cvemap to nuclei template mapping.On the seventh day, amidst the darkness, God granted ProjectDiscovery, aiding brave souls in their perilous pen-testing journey.Feb 16Feb 16
MatejsmyckaVirus.DOS.Kuku: Recreating MS-DOS Malware in Python.Welcome, hackers. This article documents how I recreated old malware named Kuku in Python.Jan 17Jan 17
MatejsmyckaMalware Development Essentials Course criticism — Proving an alternative.I recently completed the RED TEAM Operator: Malware Development Essentials Course from Sektor7 Institute. Here is my honest opinion about…Dec 21, 2023Dec 21, 2023
MatejsmyckaMaking DIY Pico-8 handheld console for 65$Creating a hardware for the Pico-8 fantasy console using Retropie.Dec 2, 2023Dec 2, 2023
MatejsmyckaCreating Cheats for Dead Cells Using Unsafe RustIn this guide, we’ll explore the process of creating a cheat for the popular game Dead Cells. The intention behind this guide is purely…Nov 30, 2023Nov 30, 2023