Blog

Home / Blog

Intro to BEFF Framework

Intro to BEFF Framework

Hey everyone, in this blog, we will be discussing about BeEF, which is short for The Browser Exploitation Framework, and some attacks that can be

Read More »
PLC Hacking (Pt. 2)

PLC Hacking (Pt. 2)

Welcome to Part 2 of our “PLC Hacking series”. In our previous blog, we covered setting up our Koyo CLICK PLC and writing our first

Read More »
IOS Jailbreaking

IOS Jailbreaking

In this blog, we are going to discuss jailbreaking, its advantages and disadvantages, as well as types and the steps for carrying out a successful

Read More »
PLC Hacking (Pt. 1)

PLC Hacking (Pt. 1)

Programmable Logic Controllers (PLCs) are industrial computers used to control different electro-mechanical processes for use in manufacturing, plants, or other automation environments. PLCs can range

Read More »
Purdue Model for OT Security

Purdue Model for OT Security

What is OT Security? Operational technology (OT) is hardware and software that detects or causes a change, through the direct monitoring and/or control of industrial

Read More »