Scroll to top

Written Research


Category

Attacking a Jammer via the Jammer’s Signal

Attacking a Jammer via the Jammer’s Signal

“Study hard what interests you the most in the most undisciplined, irreverent, and original...

admin September 4, 2024
Fireside Chat with K9 Defense

Fireside Chat with K9 Defense

An interview with a rising drone innovator! Origin and Background  I remember linking up...

admin July 23, 2024
The Art of Warcycling

The Art of Warcycling

1. Introduce yourself, give us a little bit about your background, what do you...

admin July 8, 2024
Pentesting with Angry Oxide

Pentesting with Angry Oxide

Here’s your task, understand the capabilities first! Passive recon running Angry Oxide from Rage...

admin June 25, 2024
Long Range Hacking by Daniel Dieterle

Long Range Hacking by Daniel Dieterle

Guest article from a great business mentor and friend Daniel Dieterle. LoRa or Long-Range...

admin June 19, 2024
Irregularly Supplied in the Second Cold War

Irregularly Supplied in the Second Cold War

Introduction Irregular Warfare (IW) campaigning encompasses the sophisticated and strategic deployment of resources by...

admin June 5, 2024
The Glue Logic of Choice for Drone Operators

The Glue Logic of Choice for Drone Operators

The glue logic of choice for unmanned projects is what's known as MOSA. MOSA...

admin June 1, 2024
Interview with Script Tactics

Interview with Script Tactics

How Do You See the Intersection Between Software Engineering and Cyber Tactical Operations, and...

admin May 13, 2024
Electronic Warfare of Drones

Electronic Warfare of Drones

Electronic Warfare of Drones Introduction The advent of unmanned aerial vehicles (UAVs) has revolutionized...

admin May 1, 2024
Where's the risk? Show me!

Where's the risk? Show me!

March Madness Hunter of drone pilots. This article is for educational purposes. A look...

admin March 20, 2024
Guest Article: Guerrilla Assault Medic

Guest Article: Guerrilla Assault Medic

Guerrilla Assault Medic Hacking for Austere Medicine by Disruptor 26 “Strike an enemy once...

admin February 14, 2024
SCALES University: Air Recon Course

SCALES University: Air Recon Course

AIR RECON COURSE A NOTE FROM THE INSTRUCTOR: Elevate Your Tactical Advantage with Cutting-Edge...

admin January 14, 2024
ASRT Mobile Command Concept

ASRT Mobile Command Concept

Response Team            As urban reconnaissance professionals; it is our mission...

admin November 10, 2023
The Pi Telemetry

The Pi Telemetry

Ideally the campaign is to rig up an SDR via script in python to...

admin October 5, 2023
Penetration Test: Lightning

Penetration Test: Lightning

Lightning round of thought processes to Wi-Fi penetration testing. Here's a quick overview of...

admin October 2, 2023
Wireshark Basics

Wireshark Basics

Baseline Vitals with WIRESHARK Wireshark is a popular and powerful network protocol analyzer used...

admin August 24, 2023