Beyond Basic Search: Mastering Google Dork for Advanced Research

Google dorking is a method that leverages Google Search and other Google tools to uncover security vulnerabilities in website configurations and code. It involves using specific operators in the Google search engine to pinpoint sections of text on websites that indicate vulnerabilities, such as particular versions of vulnerable web applications.…

Dhiraagu / Ooredoo ONT Telephony (PBAX) to Softphone (SIP)

Introduction Here in Maldives when we get our internet connection our ISP offers free home landline connection with 0$ fee with some perks. However, this landline connection details such as username and password are not shared to the billed customer. This blog will cover on getting the details of the…

A Reality Check on Life’s Limited Clock

We have the delusion that time is plenty. Days pass by, and we sometimes put off embracing life to the fullest until later. But what if we took a moment to reflect on how little time we actually have left? It's not that you're lazy or…

Homelab Update: HP Elitedesk G3 mini

As most of my friends know I have been using my old acer aspire laptop as my main server. Transitioning to a Mini PC has helped me to reduce electricity costs and open to a new world into more flexible hardware to work with. Hardware Elitedesk G3 mini is equipped…

Building my Homelab: A Journey into CasaOS, Cloudflare Zero Trust, and More!

Introduction: Setting up a home lab has grown in popularity among tech lovers in this age of technology since it enables them to experiment, learn, and harness the power of numerous cutting-edge technologies. In order to create the best possible home lab environment, I deliberately combined CasaOS over Ubuntu, Cloudflare…

Unraveling the ZKteco Backdoor

The significance of protecting sensitive information cannot be emphasized in the current digital era, where security breaches are becoming more frequent. Inside this small country called Maldives in many Governments, Private organizations or homes people choose to use ZKteco access control. This blog explores the world of ZKteco backdoor, its…