All Posts

  • One Year On Medium

    One Year On Medium

    It’s been a year since I published my first article on Medium, let’s see how things went. Goals When writing my first article, my aim was to inform readers about various cybersecurity topics. I wanted to explain how attacks worked, how to use different tools, and share my experience using these tools. All of my…


  • DNS Poisoning

    DNS Poisoning

    DNS poisoning is the act of intercepting DNS requests and sending spoofed responses. This can be done as most DNS requests are sent in plaintext, making it easy to intercept. These attacks are actually quite common as most routers use it censor adult websites on devices. In this article, we’ll go over ways to perform…


  • Kali vs Parrot vs Athena

    Kali vs Parrot vs Athena

    The operating system is an integral part of cybersecurity. Each one offers different tools and functions catering to different people. In this article, I will review some of the differences and my experiences with the OSs I’ve used. Kali Based on Debian, link here. Pros: Cons: Parrot Based on Debian, link here. Pros: Cons: Athena Based on…


  • Portmaster: Privacy Oriented Firewall

    Portmaster: Privacy Oriented Firewall

    Safing’s Portmaster is an open source firewall that allows users to monitor and block network activity. Its primary purpose is to protect privacy by blocking malicious connections from apps and hiding the computer’s IP address. In this article, I will go over my experiences with setting up and using Portmaster. Setup Installing Portmaster was simple, I…


  • FauxPilot: Self Hosted AI Coding Assistant

    FauxPilot: Self Hosted AI Coding Assistant

    FauxPilot is an AI coding assistant compatible with VScode, the OpenAI API (limited), and with curl. As its name suggests, FauxPilot is similar to Github Copilot, having essentially the same functions. In this article, I will go over my experience setting up and using FauxPilot. Setup FauxPilot has a server and a client. The server runs…