XoR Encryption
Understanding how XoR Encryption works and implementing it in C
Greetings friend and welcome to my blog. Here you will find all things cyber research, offsec walkthroughs, opinions, and programming.
Understanding how XoR Encryption works and implementing it in C
Exploring weaknesses and attacks against enterprise WiFi setups using rogue APs and custom tooling
Advanced RC4 Encryption walkthrough using C programming language
Simple RC4 Encryption walkthrough using C programming language and a short data example
Ethical hacker and researcher. I absolutely love cybersecurity, probably because working in this field constantly feeds my curiosity and my need to understand how things really work. LOL, I guess this is also why I love C programming.
In any case, my day-to-day job is to find vulnerabilities in applications and infrastructure. This blog is to share useful insights, experiments, and stories from my personal experience. Hopefully you’ll find something valuable (or at least entertaining) here. Enjoy the read.