
Why HTTPS Works: Secret Keys, Mod Math, and That Lock You Ignore
A chill, chaotic walkthrough of how your browser makes secret deals with websites. Featuring HTTPS, TLS, public/private key flirting, and why mod math is a delicious little trapdoor.
A chill, chaotic walkthrough of how your browser makes secret deals with websites. Featuring HTTPS, TLS, public/private key flirting, and why mod math is a delicious little trapdoor.
A hands-on walkthrough of debugging Clash's HTTP & SOCKS proxy ports on Linux, configuring git/pip access, and switching ports with custom shell aliases.
โ ๏ธ WARNING: If youโre using a non-jailbroken iPhone, you need to use Shadowrocket to fit this Pi + Clash setup. ๐ฑ Make sure your phone or router allows IPv6 to be disabled before you commit to this...
This blog walks through the second phase of my custom subnet project - building a working mini Command & Control (C2) infrastructure. Use Python's Flask as the controller and an iPhone as the agent...
From `255.255.255.0` to full-blown subnet royalty - this blog walks you through setting up your own `/29` subnet, manually assigning IPs, running a hotspot router from your laptop, and hosting a st...
๐ Quick steps(temporary): sudo ip link set dev INTERFACE down sudo ip link set dev INTERFACE address NEW_MAC_ADDRESS sudo ip link set dev INTERFACE up ๐ธ Example: Suppose your network card (Wi...
Send messages between your phone and PC like a hacker - with netcat & bash.
๐ฏ WHY does a memory address need 8 bytes (64 bits), while an int is only 4 bytes (32 bits)? โ Because: It Depends on Address Space Size A memory address needs to be big enough to point to any pos...
๐งฎ Q: How many bits to count to 15? Letโs rephrase it: Whatโs the smallest number of bits (binary digits) you need to represent the decimal number 15? ๐ฅ Hereโs the magic: In binary: 1 ...
โฐ Time Complexity ๐ฅ Big O (O) - Upper Bound โNo matter what, the algorithm wonโt be worse than this.โ Example: O(nยฒ) Means: In the worst case, the running time grows no faster than nยฒ. Th...