Skip to content
Primary Menu
  • Welcome πŸš€
  • About Us ✨
    • Legacy Members
  • Blog πŸ€“
    • Rapid Reads
    • Awareness
    • Cloud
    • Cryptography
    • Development
    • Engineering
    • Learning Resources
    • Penetration Testing
    • Securiteenies
    • Special Interest
    • Technical Fundamentals
    • Web
    • Mobile
    • Fraud
    • Governance, Risk and Compliance
  • Newsletter πŸŽ‰
  • Talks & Conferences🎀
  • Merchandise πŸ›’
Security Queens

Welcome to our Blog!

Month: February 2022

  • Home
  • 2022
  • February
Category: Development/Hardware/Securiteenies

Deauth Yourself: How to Build a Deauthenticator

Posted On 4 February 202227 January 2022 By Sarahcomment

Estimated difficulty:  πŸ’œπŸ€πŸ€πŸ€ 🀍 Welcome to the wonderful world of hardware. This blog post is a walkthrough of how to build a deauthenticator; a pocket-sized tool that you can create to kick a device off of a network (especially good to know for April fools, or if you just want Continue Reading

Load More Posts
Socials

Copyright Β© All rights Reserved || Theme: Infinity Blog by Themeinwp