Scroll to top

Communications


Tag

Attacking a Jammer via the Jammer’s Signal

Attacking a Jammer via the Jammer’s Signal

“Study hard what interests you the most in the most undisciplined, irreverent, and original...

admin September 4, 2024
The Art of Warcycling

The Art of Warcycling

1. Introduce yourself, give us a little bit about your background, what do you...

admin July 8, 2024
Pentesting with Angry Oxide

Pentesting with Angry Oxide

Here’s your task, understand the capabilities first! Passive recon running Angry Oxide from Rage...

admin June 25, 2024
Long Range Hacking by Daniel Dieterle

Long Range Hacking by Daniel Dieterle

Guest article from a great business mentor and friend Daniel Dieterle. LoRa or Long-Range...

admin June 19, 2024
Irregularly Supplied in the Second Cold War

Irregularly Supplied in the Second Cold War

Introduction Irregular Warfare (IW) campaigning encompasses the sophisticated and strategic deployment of resources by...

admin June 5, 2024
The Glue Logic of Choice for Drone Operators

The Glue Logic of Choice for Drone Operators

The glue logic of choice for unmanned projects is what's known as MOSA. MOSA...

admin June 1, 2024
Electronic Warfare of Drones

Electronic Warfare of Drones

Electronic Warfare of Drones Introduction The advent of unmanned aerial vehicles (UAVs) has revolutionized...

admin May 1, 2024
Thunderhawk Project

Thunderhawk Project

Warcloud Industries and Look for Me Non-Profit Join Forces to Empower Native American Communities...

admin June 26, 2023
Software Defined Radio

Software Defined Radio

Software Defined Radio Software-defined radio (SDR) is a technology that allows a computer to...

admin May 13, 2023