News

In part one we started hacking Bluetooth and made a little £2 key-finder beep using only Android and Linux. If you haven’t ...
KU Presents! is back in 2025-26 with a new director, a new website and an exciting lineup that combines quality with both ...
Secure Symmetric Encryption and Decryption Python script for secure string encryption (using Fernet) with password-based key derivation (using PBKDF2-HMAC-SHA256) ...
IntroductionAPT37 (also known as ScarCruft, Ruby Sleet, and Velvet Chollima) is a North Korean-aligned threat actor active since at least 2012. APT37 primarily targets South Korean individuals ...
The concept originates from mathematician George Boole, who in the 19th century developed an algebraic system of logic using only two values: true and false. In computer science, this binary way of ...
This is just a simple encryption algorithms that can be cool when it comes to understanding and exploring how does encryption works, but not seriously used to handle security on real life ...