About Hoid
Growing up watching The Matrix and Modern Marvels had a profound impact on my young mind and lead to a fascination with STEM, which culminated in studying Aerospace Engineering at university. There I utilized my passion for diversity and the environment to help my team realize their full potential, building competition winning solar projects and placing first in NASA challenges. My natural curiosity empowered me to quickly discover that those same engineering skills could be used to break things
- Website: twitter.com
Hoid's Latest Posts
How To: Use Zero-Width Characters to Hide Secret Messages in Text (& Even Reveal Leaks)
How To: Hack Like It's 1987 (An Introduction to the Telehack Retro Game)
How To: The 15 Most Popular Talks from DEFCON's Hacking Conferences
Raspberry Pi Alternatives: 10 Single-Board Computers Worthy of Hacking Projects Big & Small
How To: Hack Together a YouTube Playing Botnet Using Chromecasts
Buyer's Guide: Top 20 Hacker Holiday Gifts of 2018
How To: Flood Your ISP with Random, Noisy Data to Protect Your Privacy on the Internet
How To: Buy Bitcoin Anonymously — A Guide to Investing in Cryptocurrency While Maintaining Privacy
How To: Use Cerberus to Take Control of Anyone's Android Phone
Hacking Elevators: How to Bypass Access Control Systems to Visit Locked Floors & Restricted Levels in Any Building
How To: Attend Defcon Without Looking Like a Noob or Spending a Fortune
Advanced Phishing: How to Inject Meetings into Anyone's Google Calendar
How To: Run Kali Linux as a Windows Subsystem
How To: How Hackers Use Hidden Data on Airline Boarding Passes to Hack Flights
How To: Use the Chrome Browser Secure Shell App to SSH into Remote Devices
How To: Enable the New Native SSH Client on Windows 10
How To: Create a Native SSH Server on Your Windows 10 System
Buyer's Guide: Top 20 Hacker Holiday Gifts for Christmas 2017
How To: Find Anyone's Private Phone Number Using Facebook
How To: Gain Complete Control of Any Android Phone with the AhMyth RAT
How To: Hide DDE-Based Attacks in MS Word
How To: Exploit DDE in Microsoft Office & Defend Against DDE-Based Attacks
How To: Detect BlueBorne Vulnerable Devices & What It Means
How To: Execute Code in a Microsoft Word Document Without Security Warnings
How To: Create a Wireless Spy Camera Using a Raspberry Pi
How To: Turn Your Raspberry Pi into a Wireless Hotspot
How To: Detect Bluetooth Low Energy Devices in Realtime with Blue Hydra
How To: VPN Your IoT & Media Devices with a Raspberry Pi PIA Routertraffic
How To: Use a Virtual Burner Phone to Protect Your Identity & Security
How To: Protect Your Identity After the Equifax Cyberattack
How To: Use a Raspberry Pi as a Dead Drop for Anonymous Offline Communication
How To: Track Government Aircraft 200 Miles Away with a Raspberry Pi
How To: Track ADS-B Equipped Aircraft on Your Smartphone
Next Page
Prev Page
Sites
- Hot
- Latest
-
How To: Lock Down Your DNS with a Pi-Hole to Avoid Trackers, Phishing Sites & More
-
How To: Use Zero-Width Characters to Hide Secret Messages in Text (& Even Reveal Leaks)
-
How To: Hack Like It's 1987 (An Introduction to the Telehack Retro Game)
-
How To: The 15 Most Popular Talks from DEFCON's Hacking Conferences
-
Raspberry Pi Alternatives: 10 Single-Board Computers Worthy of Hacking Projects Big & Small
-
How To: Hack Together a YouTube Playing Botnet Using Chromecasts
-
Buyer's Guide: Top 20 Hacker Holiday Gifts of 2018
-
How To: Flood Your ISP with Random, Noisy Data to Protect Your Privacy on the Internet
-
How To: Buy Bitcoin Anonymously — A Guide to Investing in Cryptocurrency While Maintaining Privacy
-
How To: Use Cerberus to Take Control of Anyone's Android Phone
-
Hacking Elevators: How to Bypass Access Control Systems to Visit Locked Floors & Restricted Levels in Any Building
-
How To: Attend Defcon Without Looking Like a Noob or Spending a Fortune
-
Advanced Phishing: How to Inject Meetings into Anyone's Google Calendar
-
How To: Run Kali Linux as a Windows Subsystem
-
How To: How Hackers Use Hidden Data on Airline Boarding Passes to Hack Flights
-
How To: Use the Chrome Browser Secure Shell App to SSH into Remote Devices
-
How To: Enable the New Native SSH Client on Windows 10
-
How To: Create a Native SSH Server on Your Windows 10 System
-
Buyer's Guide: Top 20 Hacker Holiday Gifts for Christmas 2017
-
How To: Find Anyone's Private Phone Number Using Facebook
-
How To: Lock Down Your DNS with a Pi-Hole to Avoid Trackers, Phishing Sites & More
-
How To: Use Zero-Width Characters to Hide Secret Messages in Text (& Even Reveal Leaks)
-
How To: Hack Like It's 1987 (An Introduction to the Telehack Retro Game)
-
How To: The 15 Most Popular Talks from DEFCON's Hacking Conferences
-
Raspberry Pi Alternatives: 10 Single-Board Computers Worthy of Hacking Projects Big & Small
-
How To: Hack Together a YouTube Playing Botnet Using Chromecasts
-
Buyer's Guide: Top 20 Hacker Holiday Gifts of 2018
-
How To: Flood Your ISP with Random, Noisy Data to Protect Your Privacy on the Internet
-
How To: Buy Bitcoin Anonymously — A Guide to Investing in Cryptocurrency While Maintaining Privacy
-
How To: Use Cerberus to Take Control of Anyone's Android Phone
-
Hacking Elevators: How to Bypass Access Control Systems to Visit Locked Floors & Restricted Levels in Any Building
-
How To: Attend Defcon Without Looking Like a Noob or Spending a Fortune
-
Advanced Phishing: How to Inject Meetings into Anyone's Google Calendar
-
How To: Run Kali Linux as a Windows Subsystem
-
How To: How Hackers Use Hidden Data on Airline Boarding Passes to Hack Flights
-
How To: Use the Chrome Browser Secure Shell App to SSH into Remote Devices
-
How To: Enable the New Native SSH Client on Windows 10
-
How To: Create a Native SSH Server on Your Windows 10 System
-
Buyer's Guide: Top 20 Hacker Holiday Gifts for Christmas 2017
-
How To: Find Anyone's Private Phone Number Using Facebook
-
How To: Gain Complete Control of Any Android Phone with the AhMyth RAT
-
How To: Hide DDE-Based Attacks in MS Word
-
How To: Exploit DDE in Microsoft Office & Defend Against DDE-Based Attacks
-
How To: Detect BlueBorne Vulnerable Devices & What It Means
-
How To: Execute Code in a Microsoft Word Document Without Security Warnings
-
How To: Create a Wireless Spy Camera Using a Raspberry Pi
-
How To: Turn Your Raspberry Pi into a Wireless Hotspot
-
How To: Detect Bluetooth Low Energy Devices in Realtime with Blue Hydra
-
How To: VPN Your IoT & Media Devices with a Raspberry Pi PIA Routertraffic
-
How To: Use a Virtual Burner Phone to Protect Your Identity & Security
-
How To: Protect Your Identity After the Equifax Cyberattack
-
How To: Use a Raspberry Pi as a Dead Drop for Anonymous Offline Communication
-
How To: Track Government Aircraft 200 Miles Away with a Raspberry Pi
-
How To: Track ADS-B Equipped Aircraft on Your Smartphone