All Posts

  • Portmaster: Privacy Oriented Firewall

    Portmaster: Privacy Oriented Firewall

    Safing’s Portmaster is an open source firewall that allows users to monitor and block network activity. Its primary purpose is to protect privacy by blocking malicious connections from apps and hiding the computer’s IP address. In this article, I will go over my experiences with setting up and using Portmaster. Setup Installing Portmaster was simple, I…


  • FauxPilot: Self Hosted AI Coding Assistant

    FauxPilot: Self Hosted AI Coding Assistant

    FauxPilot is an AI coding assistant compatible with VScode, the OpenAI API (limited), and with curl. As its name suggests, FauxPilot is similar to Github Copilot, having essentially the same functions. In this article, I will go over my experience setting up and using FauxPilot. Setup FauxPilot has a server and a client. The server runs…


  • Creating a Module for the WiFi Pineapple Part 2

    Creating a Module for the WiFi Pineapple Part 2

    The WiFi Pineapple is a versatile tool for wireless attacks. The secret behind its success is its ability to run modules created by the community. These modules greatly enhance the pineapple’s versatility. In this article, I’ll be going over my experience of making one. Disclaimer: I’m building a module for the wifi pineapple MKVI (nano…


  • Creating a Module for the WiFi Pineapple part 1

    Creating a Module for the WiFi Pineapple part 1

    The WiFi pineapple is a versatile platform for wireless attacks. What makes it stand out from other devices is its ability to run 3rd party software using modules. In this article, I’ll be going over my experience building a module. Disclaimer: I’m building a module for the wifi pineapple MKVI (nano and tetra) not MKVII…


  • Login Notification Prevention Methods

    Login Notification Prevention Methods

    Login notifications are a last resort in security. They notify the victim that their account has been compromised, prompting them to change their password. This usually sucks for the attacker as all the work they put into getting the credentials is undone. In this article, we will go over ways to prevent login notifications from…