top of page
Search
Tools


Transform Your iPhone into a Powerful Remote Laptop — Configuring Termix
You’re on the couch, coffee in hand ☕, when you remember that script running upstairs. Instead of climbing up, you just grab your iPhone and connect instantly with Termix. Its that simple! What Exactly is Termix? Termix is a full-fledged SSH client application that supports designed to provide users with an efficient and secure remote server management experience. But calling it “just another SSH client” would be like calling a Swiss Army knife “just another blade.” While th
Aastha Thakker
3 min read


Shodan: Search Engine Where U Must Learn How to Search
If Google is the search engine for websites, Shodan is the search engine for the internet’s hidden machines, from webcams, databases, power grids, to sometimes even nuclear controls. Created by John Matherly in 2009, Shodan (named after the antagonist in System Shock) is a search engine that continuously scans the entire IPv4 address space, cataloging every internet-connected device it finds. Unlike traditional search engines that crawl web pages, Shodan performs network scan
Aastha Thakker
3 min read


Git VS GitHub: The Beginning of Version Control
Have you felt that familiar anxiety after staring at a terminal full of Git commands, or scrolling through a GitHub repository jammed with branches, pull requests, and merge conflicts? It’s a common hurdle. Many of us have been there, unsure whether our last commit was a step forward or if we had just created a bigger mess. But here’s the thing, once you understand the basics & the difference between Git and GitHub, everything starts to make sense. Git and GitHub are terms
Aastha Thakker
5 min read


Voice Cloning: Behind Your Digital Vocal Twin
Hey there! Today, we will see one of the most interesting use cases of AI: voice cloning. When I asked people what they understood by voice cloning, I received multiple different answers — some were correct, but many were not. Before we begin exploring what voice cloning is, let’s understand why it’s necessary. And being poetically dramatic, I’m sharing a poem which relates to “the voice.” Voice is a blade wrapped in a gentle tone, It builds or breaks what hearts may keep, A
Aastha Thakker
6 min read


Docker Tales
Docker, one of the popular terms among tech-enthusiasts! Docker is a technology suite that enables development and IT operations teams to build, ship, and run distributed applications anywhere . The term “docker” originates from the shipping industry, where standardized containers streamlined global cargo transport. Docker containers package software and its dependencies, ensuring consistent operation across diverse computing environments. The power of Docker lies in its abil
Aastha Thakker
5 min read


From Scratch to Circuit Code: Arduino Playground (1)
We humans are tactile creatures. From our earliest days as infants, we learn about the world by touching, feeling, and interacting with our environment. This doesn’t fade as we grow older — it evolves. Today the we are going to see something interesting and fun. After exploring Raspberry Pi, I’m now turning my attention to Arduino. These two platforms, while different, share a common thread: they bring computing into the physical world, allowing us to create projects we can s
Aastha Thakker
5 min read


Power of Private AI: Run your own Models on your Machines
Hey guys! What did you ask ChatGPT or Gemini today? Go ahead & tell us. Despite the buzz of AI tools like ChatGPT & Gemini, along with the advancements, comes the concerns about data privacy & security. Not everyone can use ChatGPT, Gemini or something at their job or workspace. This is mainly because of privacy and security reasons. But what if we could run our own private AI!? That doesn’t send any data to any server! Now, this is the point where the interesting part begins
Aastha Thakker
3 min read


MobSF: Hack Like a Pro, Secure Like a Boss
In our day-to-day life, mobile applications integrate into our lives, like our essential body parts. From food delivery to maps and finance management, they enhance convenience just like a wow! However, as our dependency on mobile app has increased, so does the critical need for robust cybersecurity measures. Therefore, mobile app testing has become an integral part of cybersecurity. Before going into the testing aspect, I recommend you get familiar with OWASP’s top 10 mobile
Aastha Thakker
3 min read


Nmap: Learning the Art of Network Scanning with Cool Flags!
In the world of pen testing, Nmap stands out as a popular scanning tool. Nmap stands for Network Mapper, it’s an open-source Linux command-line tool. Basically, it scans IP addresses and ports in a network, identifying installed applications. Nmap helps network admins to pinpoint devices on their network, uncover open ports and services, and spot vulnerabilities. The credit for creating Nmap goes to Gordon Lyon, also known as Fyodor, who developed it to easily map networks, r
Aastha Thakker
3 min read


Ventoy: Multi-OS Possibilities
Hey guys! So, you’ve understood crafting of a live bootable USB for Tails OS from our last blog. But hold on, what if you’re that “explorer” wanting not just one, but two or maybe three operating systems running on a single pen drive? Well, here is the solution! ‘VENTOY’! In today’s blog, we’re plunging into the universe of VENTOY — the fix for your multi-OS dreams. Let's see how to install VENTOY, its pros and cons, and key points you need to ensure a smooth and “effortless”
Aastha Thakker
4 min read


Setting Up Tails Independently.
❖ Tails is an OS, it’s like a super-secret computer system that helps you stay anonymous online. It’s the go-to choice for people who want to surf the web without anyone knowing what they’re up to. ❖ Tails, who needs privacy anyway? Just kidding, you do. Surf the web like a cyber ninja, but, you know, a really chill one. 🕵️♂️🕶️ #IncognitoModeActivated ❖ Tails, or “The Amnesic Incognito Live System,” is a security-focused Debian-based Linux distribution aimed at preserving
Aastha Thakker
4 min read
bottom of page