- Bug Bounty Hunter x Good Faith Hacker x Security Researcher x Technophilie
Bypass PowerShell Execution Policy
Learn to bypass PowerShell’s execution policy in four different ways
Recommended Router Settings
Setting up a Router with optimal settings is crucial for ensuring a reliable, fast, and secure network.
Rhynorater's $100k Roadmap
By Justin Gardner aka Rhynorater
How to Install Portainer and Uptime Kuma using Docker
Walk-through for setting up Portainer CE and Uptime Kuma on your Homelab
Building Browser Extension
Build your first chrome browser extension
How to debloat Android devices using ADB
Debloat any non-rooted Android devices
Introducing CRT-SF
Leverages the power of Certificate Transparency logs (CT logs)
Unveiling 100 Web Vulnerabilities
Curated list of 100 web vulnerabilities categorized into various types
How to install Windows Subsystem for Linux (WSL) on Windows
A feature of Windows that allows developers to run a Linux environment
Sideload Android Apps on WSA using Android Debug Bridge
Sideload Android apps on Windows Subsystem for Android (WSA) using Android Debug Bridge (ADB)