PinnedDion MulajinSystem WeaknessSub-GHz Replay Attacks over Automotive SystemsRadio Frequencies - Overview12 min read·Mar 31, 2023----
Dion MulajinSystem WeaknessADV Packets Spoofing on Apple Devices via BLEThe main use of this exploit is focused on flooding spoofed requests on the target device…..2 min read·Sep 9, 2023----
Dion MulajinSystem WeaknessKeystroke InjectionsIt’s development was mainly focused to ease the work for security engineers and pentesters. The automation of keystroke injection…3 min read·Sep 23, 2022----
Dion MulajinSystem WeaknessWiFi Pineapple and MITM AttacksMan-in-the-Middle (MITM) attacks are attack techniques that involve a man-in-the-middle which intercepts communications between two…3 min read·Jun 7, 2022--1--1
Dion MulajinSystem WeaknessProFTPD ExploitationProFTPD (Professional File Transfer Protocol server Daemon) is an open-source software, used for FTP servers on Unix and Unix-like systems…4 min read·May 7, 2022--1--1
Dion MulajinSystem WeaknessSMB-Enumeration and ExploitationSMB (Server Message Block) is a communication protocol used for shared access on resources (printers, files, serial ports etc.). So…4 min read·Apr 27, 2022----