Category: hacking

  • Taking a Look at Ruby Gems

    Taking a Look at Ruby Gems

    Origin Story. I decided to take some of my projects and publish the gems on Rubygems with my awesome username of Banksy. For those who do not know, gems are like Python’s packages. They make it easy to run code. To access the gem, simply add’ require “gem_name” ‘ to the top of the file,…

  • GlacierCTF 2025 Challenge

    GlacierCTF 2025 Challenge

    Please check out my other posted related to CTF, the name of the article is UTCFT 2025 CTF Challenge Write-Up. The GlacierCTF was hosted by  ISEC Institute @ TU Graz aka LosFuzzys. They did a great job hosting this CTF, there was no issues with the CTF. None of the challenges went down during the…

  • A guide in achieving perfect Email security.

    A guide in achieving perfect Email security.

    Please check out my other blog post named “A guide on being safe on your phone.“ Nowadays, everyone has at least one email. Email security is really important; it is the gate to all your other accounts. Most sites require you to enter an email to sign up for the site. This makes emails a…

  • My first Trip to DefCon

    My first Trip to DefCon

    Intro I want to start this out that one of the items on my bucket list was to go to Defcon. While at Defcon the first day, we also went to Pawn Stars Pawn shop where I purchased a nice round. Sadly Chamblee’s candy store was closed. Also I guess it is common in Las…

  • Using Dorks for learning and for fun.

    Google dorks do not only have to be used to find vulnerabilities or misconfigurations. Dorks can be used in your everyday search. In this blog post, I will show you dorks that can be used for everyday searching and dorks that can be used by hackers. Here are some examples of Dorks that I found…

  • UTCFT 2025 CTF Challenge Write-Up

    If you are interested reading CTF challenges please check out my other article named Snyk CTF Challenge: Feb 28th 2025 where I talk about other CTF I have participated in. Big thanks to Texas University ISSS for creating and moderating the game and the Discord chat. It was tons of fun and I learned a…

  • Snyk CTF Challenge: Feb 28th 2025.

    Please check out my other posts about other CTF’s I have participated on such as UTCFT 2025 Challenge: March 14th This was the first reverse engineering challenge. It was labeled easy. The first thing I did was use the strings command to view all the strings in the binary. The string command will print all…

  • Add Comment Column on Wireshark.

    Please check out this other post of mine titled “Using Dorks for learning and for fun.“. It shows you how to use Dorks to find better information on the internet. Adding column to Wireshark. In this tutorial, I will explain how to add a new column to Wireshark that displays comments. I have found this…

  • SnackHack2: Hacking tool and Recon

    SnackHack2: Hacking tool and Recon

    This tool comes in gem form and can also be downloaded from Github.com. Originally, this project would be my senior project, but I had to scrape the idea for a simpler project due to my course workload and mental health. Please check out my other article about this tool, the article name is SnackHack2: Scripts…