Skip to content
Primary Menu
  • Welcome
  • About Us
    • Legacy Members
  • Blog
    • Rapid Reads
    • Awareness
    • Cloud
    • Cryptography
    • Development
    • Learning Resources
    • Penetration Testing
    • Securiteenies
    • OSINT
    • Threat Intelligence
    • Wireless
    • Best Practice
    • Special Interest
    • Technical Fundamentals
    • Web
    • Mobile
    • Fraud
    • Frida
    • Governance, Risk and Compliance
  • Newsletter
  • Talks
  • Pin Posts
  • Pin Posts
Security Queens

Welcome to our Blog!

Day: 4 February 2022

  • Home
  • 2022
  • February
  • 4
Category: Development/Hardware/Securiteenies

Deauth Yourself: How to Build a Deauthenticator

Posted On 4 February 202227 January 2022 By Sarahcomment

Estimated difficulty:  💜🤍🤍🤍 🤍 Welcome to the wonderful world of hardware. This blog post is a walkthrough of how to build a deauthenticator; a pocket-sized tool that you can create to kick a device off of a network (especially good to know for April fools, or if you just want Continue Reading

Load More Posts

Socials