Attacking a Jammer via the Jammer’s Signal
“Study hard what interests you the most in the most undisciplined, irreverent, and original...
Fireside Chat with K9 Defense
An interview with a rising drone innovator! Origin and Background I remember linking up...
The Art of Warcycling
1. Introduce yourself, give us a little bit about your background, what do you...
Pentesting with Angry Oxide
Here’s your task, understand the capabilities first! Passive recon running Angry Oxide from Rage...
Long Range Hacking by Daniel Dieterle
Guest article from a great business mentor and friend Daniel Dieterle. LoRa or Long-Range...
Irregularly Supplied in the Second Cold War
Introduction Irregular Warfare (IW) campaigning encompasses the sophisticated and strategic deployment of resources by...
The Glue Logic of Choice for Drone Operators
The glue logic of choice for unmanned projects is what's known as MOSA. MOSA...
Interview with Script Tactics
How Do You See the Intersection Between Software Engineering and Cyber Tactical Operations, and...
Electronic Warfare of Drones
Electronic Warfare of Drones Introduction The advent of unmanned aerial vehicles (UAVs) has revolutionized...
Where's the risk? Show me!
March Madness Hunter of drone pilots. This article is for educational purposes. A look...
Guest Article: Guerrilla Assault Medic
Guerrilla Assault Medic Hacking for Austere Medicine by Disruptor 26 “Strike an enemy once...
SCALES University: Air Recon Course
AIR RECON COURSE A NOTE FROM THE INSTRUCTOR: Elevate Your Tactical Advantage with Cutting-Edge...
ASRT Mobile Command Concept
Response Team As urban reconnaissance professionals; it is our mission...
The Pi Telemetry
Ideally the campaign is to rig up an SDR via script in python to...
Penetration Test: Lightning
Lightning round of thought processes to Wi-Fi penetration testing. Here's a quick overview of...