Skip to content
Primary Menu
  • Welcome
  • About Us
    • Legacy Members
  • Blog
    • Rapid Reads
    • Awareness
    • Cloud
    • Cryptography
    • Development
    • Learning Resources
    • Penetration Testing
    • Securiteenies
    • OSINT
    • Threat Intelligence
    • Wireless
    • Best Practice
    • Special Interest
    • Technical Fundamentals
    • Web
    • Mobile
    • Fraud
    • Frida
    • Governance, Risk and Compliance
  • Newsletter
  • Talks
  • Pin Posts
  • Pin Posts
Security Queens

Welcome to our Blog!

hardware

  • Home
  • Blog 🤓
  • hardware
Category: Development/Hardware/Securiteenies

Deauth Yourself: How to Build a Deauthenticator

Posted On 4 February 202227 January 2022 By Sarahcomment

Estimated difficulty:  💜🤍🤍🤍 🤍 Welcome to the wonderful world of hardware. This blog post is a walkthrough of how to build a deauthenticator; a pocket-sized tool that you can create to kick a device off of a network (especially good to know for April fools, or if you just want Continue Reading

Category: Hardware

Digispark Programming

Posted On 17 April 202018 April 2020 By Sarah5 Comments

Estimated difficulty: 💜💜💜🤍🤍 Welcome to the Beginners guide to Digispark programming! Hardware can be a bit of a mystery, so in terms of understanding it, it is best to start small and complete some fun projects along the way. This article will answer some basic questions, like how to set Continue Reading

Load More Posts

Socials