π Web Security 16
- How the Internet Works: CGNAT, IPv6, Jump Boxes, Remote Access, and Beyond
- Bypassing CGNAT with Reverse SSH
- DevTools to .ts: My Full Walkthrough of Building M3U8-Probe
- Crack That ZIP - Using John + Hashcat (`No hashes loaded` Error Fix Included)
- Why IPv6 Is a Privacy Nightmare in Disguise
- From Clash to V2RayN: Unlocking SOCKS5
- Hashcat Basics: Cracking Passwords with Masks, Modes & Benchmarks
- Why HTTPS Works: Secret Keys, Mod Math, and That Lock You Ignore
- Proxy or Die Trying: Troubleshooting of Ports, Git, and Clash on Linux
- Building a Pi-Hole DNS Firewall with Clash VPN Routing - Wireless, Leak-Free, No-Cable Setup
- Turn Your Subnet Into a Battlefield - Building a Real Mini C2 Setup
- Bend the LAN to Your Will - Building Your Own Subnet from Scratch
- [Linux] Spoof Your MAC Address in Linux
- [Windows Guide] How to Refresh Your IP and Change Your Digital Identity with MAC Spoofing
- [Windows Guide] How to Permanently Spoof Your MAC Address
- How Curiosity Hijacked Me: Cracking My Router's Hidden Token