Developing the Rogue Pi
March 20th, 2013 | by Kalen Wessel
Developing the Rogue Pi for my final project at BCIT was a great experience. It provided me the opportunity to
March 20th, 2013 | by Kalen Wessel
Developing the Rogue Pi for my final project at BCIT was a great experience. It provided me the opportunity to
January 14th, 2013 | by Kalen Wessel
Project Goals The primary goal is to design and build a low-cost penetration device using the Raspberry Pi and other
January 6th, 2013 | by Luke Queenan
As part of my covert backdoor application, I created a key logger for a Linux system written in C. The
October 29th, 2012 | by Luke Queenan
If you’ve ever wanted to know how to redirect people to random websites for fun, today is your lucky day.
October 29th, 2012 | by Kalen Wessel
What are CTFs? Capture The Flag competitions have started to become a growing trend in the security community. They are