Sam Galope
-
How to Check MAC Address and Expose the Vendor Instantly
Tags: check MAC address, command line tools, cybersecurity tutorial, Ethical Hacking, FOSS tools, how to check MAC address, IEEE OUI list, MAC address vendor, MAC vendor lookup, macvendors API, network reconnaissance, network security, Open Source Tools, Python macaddress library, Tech TutorialThink your network’s clean? Check MAC address info from the command line to reveal hidden vendors and expose suspicious devices—fast, simple, ethical.
-
How to Do WiFi Geotagging with Android (No Root, No Nonsense)
Tags: digital nomad, Ethical Hacking, foss, geotagging, gpsd, kismet, network recon, Open Source Tools, termux, wardriving, wifi mappingGeotagging WiFi networks kept me online in the mountains—and taught me how signals reveal more than you think. Learn how to map safely, the FOSS way.
-
How to Use CeWL for Ethical Password Guessing from Public Info
Tags: CeWL, cybersecurity tips, digital security, Ethical Hacking, FOSS tools, infosec, OSINT, password guessing, password safety, personal data, termuxPassword guessing doesn’t start with brute force—it starts with your old blog. Use CeWL to ethically test what personal info could expose your credentials.
-
How to Use Cupp for Ethical Password Cracking
Tags: create custom password list, custom wordlist, Cybersecurity Tools, DIY password list tool, Ethical Hacking, ethical password cracking, generate password wordlist, open source security tools, password cracking, password cracking wordlist generator, password list generator, personalized password dictionary, targeted password list generator, Termux hacking tools, wordlist creator for brute forceLearn ethical password cracking with Cuppy. Generate custom wordlists to expose weak passwords and help secure systems—FOSS tools for good.
-
DIY Wardriving: How to Ethically Scan Wireless Networks
Tags: beginner hacking guide, black-rimmed glasses, Cybersecurity, Ethical Hacking, ethical wardriving, network security, open source security tools, tech adventure, wardriving, WiFi reconnaissance, wireless network scanning, wireless securityDiscover ethical wardriving basics and tools to secure your WiFi—master wireless recon and protect your network like a pro.
-
How to Set Up CodeIgniter 4 in Docker on Ubuntu (Step-by-Step Guide)
Tags: CodeIgniter 4, Containerization, Docker, Docker Compose, Ethical Hacking, foss, government tech, LAMP, NGO Tech, open source, PHP, PHP Framework, Tech Tutorial, Ubuntu, web developmentSet up CodeIgniter 4 in Docker on Ubuntu—no vague errors, no missing modules. Just a working dev stack with full debug and ethical hacking potential.
-
Background Screening for Employment Made Easy with Mr.Holmes
Tags: Background Screening, Cybersecurity, Digital Footprint, Ethical Hacking, FOSS Hiring, Mr.Holmes, NGO Tech, Open Source Tools, OSINT, Termux toolsStreamline background screening for employment with Mr.Holmes—an ethical, open-source tool to trace digital footprints with just a username.
-
How to Find If Someone Is on a Dating Site — Expose Their Secret Profiles with One Tool
Tags: business security, Ethical Hacking, find dating profiles, foss, government tech, linux cli, mr holmes, ngos, open source intelligence, OSINT tools, sherlock, student osint guide, Termux tools, username searchHow to find if someone is on a dating site? Use this ethical tool to expose hidden profiles. Let Sherlock and Mr. Holmes uncover the truth!