September 05, 2025
Security Writeups
15 min read
WiFi Hacking with NodeMCU ESP8266: Complete Guide
Comprehensive guide to building a WiFi penetration testing toolkit using NodeMCU ESP8266. Learn how to create deauth attacks, evil twin access points, and captive portal deployment for authorized wireless security testing in educational environments.
NodeMCU ESP8266
WiFi Security
Arduino IDE
Read Full Article
September 08, 2025
Security Writeups
12 min read
BadUSB Attacks with Raspberry Pi Zero W: USB HID Exploitation
Step-by-step tutorial on creating a BadUSB device using Raspberry Pi Zero W for keystroke injection attacks. Covers payload development, HID configuration, and advanced persistence techniques for authorized red team operations and physical security testing.
Raspberry Pi Zero W
USB HID
Physical Security
Read Full Article
September 10, 2025
Security Writeups
18 min read
RF Car Key Hacking: M5StickC Plus2 + CC1101 Module Analysis
Deep dive into automotive RF security testing using M5StickC Plus2 and CC1101 module. Learn signal analysis, recording and replay attacks, frequency hopping techniques for authorized vehicle security assessments in controlled environments.
M5StickC Plus2
CC1101 Module
RF Security
Read Full Article
September 12, 2025
Security Writeups
14 min read
RFID Access Card Cloning: M5StickC Plus2 Security Testing
Learn how to build RFID security testing tools using M5StickC Plus2 and RFID modules. Covers proximity card analysis, cloning techniques, and NFC security assessment for authorized physical security testing of access control systems.
M5StickC Plus2
RFID Security
Access Control
Read Full Article
September 14, 2025
Security Writeups
16 min read
BLE Penetration & Jamming: M5StickC Plus2 + NRF24L01 Testing Kit
Comprehensive guide to Bluetooth Low Energy security testing using M5StickC Plus2 and NRF24L01 module. Learn BLE device enumeration, packet sniffing, jamming techniques, and connection hijacking for IoT security assessments.
M5StickC Plus2
BLE Security
IoT Testing
Read Full Article
September 18, 2025
Security Writeups
10 min read
Custom Evil Portal Collection: Advanced Social Engineering
Building realistic captive portal collections for authorized penetration testing engagements. Learn Flask development techniques, UI design principles matching legitimate services, and deployment strategies for educational security demonstrations.
Flask
Social Engineering
Web Development
Read Full Article