sockpuppetsinInfoSec Write-upsDecoding the Enigma: A Journey into Minesweeper’s Reverse EngineeringHow to Reverse Engineer MineSweeper7 min read·Aug 20, 2023----
sockpuppetsinInfoSec Write-upsGame Hacking 101: Unleashing the Power of Memory ManipulationIntroduction22 min read·Jul 8, 2023----
sockpuppetsinDev GeniusGame Hacking 101: Unleashing the Power of Memory ManipulationIntroduction22 min read·Jul 8, 2023----
sockpuppetsinDev GeniusIdentifying Coin Scammers with Wallet-TrackerIntroduction4 min read·Jan 16, 2023----
sockpuppetsinInfoSec Write-upsIdentifying Coin Scammers with Wallet-TrackerIntroduction4 min read·Jan 15, 2023--2--2
sockpuppetsinInfoSec Write-upsHow I hacked CTX and PHPass ModulesPreface6 min read·May 25, 2022--2--2
sockpuppetsinInfoSec Write-upsHacking Instagram ScammersHacking Instagram Scammers and Takeover Admin Panel5 min read·Apr 11, 2022--4--4
sockpuppetsinDev GeniusHacking Instagram ScammersHacking Instagram Scammers and Takeover Admin Panel5 min read·Apr 11, 2022--1--1
sockpuppetsinInfoSec Write-upsBypassing Door PasswordsInstead of a key, this type of lock system requires a numerical code to grant entry to a facility or property. The code is punched in by…3 min read·Jan 7, 2022----