Python from absolute zero. Learning to work with strings, files, and the Internet

Date: 31/05/2025

One day, Crocodile Gena and Cheburashka were asked to write an essay on the topic ’How I spent my summer.’ The problem was that the friends drank beer all summer. Gena, who can’t lie, wrote it that way, so Cheburashka had to replace some words. And since Cheburashka was a Python coder, he did this using a string function. In this article, I’ll show you how to keep up with Cheburashka and learn how to work with strings, files, and make requests to websites in Python.
Read full article →


Python from absolute zero. Learning to code without boring books

Date: 30/05/2025

If you think a hacker doesn’t need programming, you’re deeply mistaken! Yes, you can rock Kali Linux and use premade programs, copy code from forums, and blindly download scripts from GitHub. But your skill limit until you learn to write and understand code will be low. In this article, I will try to teach you the basics of programming in an accessible form. Starting from zero!
Read full article →


Custom fabrication. Reversing D-Link router firmware

Date: 02/04/2025

When you create custom firmware for routers, you often have to forge the signature so that your handmade microcode can be flushed using the stock web interface. To forge a signature, you must be familiar with the image validation procedure in the stock firmware. To get a general idea of this process, let’s reverse firmware embedded into the D-Link DIR-806A B1 router and find out how signature validation is implemented in it.
Read full article →


Serpent anatomy: Dissecting and reversing PyInstaller

Date: 25/03/2025

Humanity has created a whole bestiary of scripting languages ​​with low learning curves in an attempt to make the IT world accessible to imbeciles newbies who have completed a month-long course. Without question, Python is currently the king of beasts in this bestiary. The creeping reptile has entangled the entire IT industry with its rings so much that even a neural network cannot be trained without it. If so, time has come to dissect the serpent and look at its insides. Let’s start with a technology called PyInstaller.
Read full article →


ADS-B Spoofing

Date: 17/03/2025

Modern aircraft continuously transmit telemetry to each other using the ADS-B protocol. In this article, I will explain how to create your own imaginary plane and demonstrate how data transmission works. Important: all actions described below will be performed in strict compliance with the respective laws and safety regulations.
Read full article →


ADS-B guide

Date: 24/02/2025

Wherever you are, aircraft frequently pass overhead; sometimes several ones in a few minutes. Services like Flightradar24 provide precise real-time information about these flights using data received over the ADS-B protocol. You can also receive and decode such data; just follow instructions provided in this guide!
Read full article →