All Posts

  • FauxPilot vs Other Self Hosted AI Coding Assistants

    FauxPilot vs Other Self Hosted AI Coding Assistants

    A few months back I reviewed FauxPilot, a self hosted AI coding assistant that ran on docker. Overall it was an okay experience but it’s been some time and the AI llm scene has changed drastically. What’s Changed One of the biggest changes to llm’s is better quantizing methods. Quantizing allows models to be shrunk down…


  • Web Encryption Using Javascript

    Web Encryption Using Javascript

    I was analyzing a login page one day, and an odd idea came to me. What if we encrypt the data being sent on a website using Javascript? Admittedly, this idea seems pretty useless seeing that HTTPS does the same thing but better, but what about websites that use self-signed certificates or don’t use HTTPS…


  • Cloud Computers for Hacking

    Cloud Computers for Hacking

    Cloud computing has been around for a while now. There are offerings from many big tech companies and it’s very cheap, sometimes free, to get a cloud server up and running. In this article, we’ll look at the uses of these servers in the world of cybersecurity. Hosts But before we begin let’s review some…


  • One Year On Medium

    One Year On Medium

    It’s been a year since I published my first article on Medium, let’s see how things went. Goals When writing my first article, my aim was to inform readers about various cybersecurity topics. I wanted to explain how attacks worked, how to use different tools, and share my experience using these tools. All of my…


  • DNS Poisoning

    DNS Poisoning

    DNS poisoning is the act of intercepting DNS requests and sending spoofed responses. This can be done as most DNS requests are sent in plaintext, making it easy to intercept. These attacks are actually quite common as most routers use it censor adult websites on devices. In this article, we’ll go over ways to perform…