Nmap Series v01

Nmap Series — v.01 Understanding the TCP Connect Scan (-sT)   Introduction In this series, I’ll be taking a deep, methodical dive into widely used penetration testing tools.The goal is not to memorize commands, but to understand what the tools are doing under the hood and why we choose certain techniques over others. We’ll be […]

DoSing BookNerdSociety

Whitepaper: Distributed Traffic Load Simulation & Defensive Analysis on BookNerdSociety.com Author: CysectoolsDate: November 2025Version: 1.0 Abstract This whitepaper documents a controlled cybersecurity experiment designed to evaluate the resilience of BookNerdSociety.com against distributed traffic spikes, rate-limiting bypass attempts, slowloris-style socket exhaustion, and mixed behavioral request patterns.The study involved developing a custom micro-botnet simulation tool in Python […]

Built a Tool That Helped Me Build a Tool

I ended up building a tool that helped me build another one of my tools. This was never my intention from the start, but it ended up working so perfectly! This is why I’m in love with programming… While building this new tool/platform of mine: BotSentinel. Some context: I’ve been building Telegram bots for about […]

QElements: The Parent-Child Styling Revolution

LIVE DEMO: [https://q-elements-demo.vercel.app] “Stop hunting through 47 files just to change one style. There’s a better way.” The Problem You’re building a React app. You’ve got your main container styles in `App.tsx`. Then you create `Dashboard.tsx`, `UserProfile.tsx`, `Settings.tsx`… Suddenly, you’re hunting through files just to change the padding on your main container. “Where did I […]

From Sound Waves to Cybersecurity My DIY Password Generator Project

⚡️⚙️ Some time ago, I decided to blend two of my passions: electronics and ethical hacking. ⚙️ 👨‍💻 Using an ultrasonic transducer/transceiver hooked up to an Elegoo microcontroller (Arduino-style), I built a system that listens to environmental feedback — then processes that data in C++ to output… password permutations. Not random ones — entropy-rich, context-influenced […]

winsandwoesofspidergo

🚀 Today’s Wins (and Woes) Building SpiderGo 🚀 Some skills I’ve learned—or painfully reinforced—while building SpiderGo: Quick Context: SpiderGo is a Golang-based cybersecurity web crawler that automates the recon portion of bug bounty hunting. It’s designed for Bug Bounty Hunters, Red & Blue Teams, PenTesters, and other cyber pros with proper authorization. In short: don’t be a jerk and […]

From CLI to GUI My PayloadGo Adventure

From CLI to GUI: My PayloadGo Adventure 🖱️💥 Ever had that moment where you’re coding away at 2 AM and think, “I wonder what would happen if this terminal magic got a face…”? Yeah. That was me last night. 🎨 Meet PayloadGo GUI — the shiny, clickable, visual sibling of my command-line payload testing tool. […]

WPScan The WordPress Whisperer

WPScan – The WordPress Whisperer You Didn’t Know You Needed So, you’re on Kali Linux, sipping your coffee, and feeling like a cybersecurity wizard. Then you remember — nearly half the internet is powered by WordPress… and a terrifying number of those sites are guarded as well as a cardboard box in the rain. Enter […]

Subx The Subdomain Sniffer

Subx: The C++ Subdomain Sniffer You Didn’t Know You Needed (Until Now) Let’s face it. The internet is full of secrets, most of which are hiding right in the open. Like your forgotten .devsubdomain that’s still running on a 2017 version of WordPress. Welcome to Subx, the unapologetically fast, C++-powered subdomain enumeration tool that helps […]

CSRF Attack The Hackers Favorite Magic Trick

CSRF Attacks: The Hacker’s Favorite Magic Trick (and Your Web App’s Worst Nightmare) So, you’ve finally built that shiny new web app. Clean UI, buttery-smooth UX, and maybe even a dark mode toggle—fancy! But somewhere in your code, a tiny crack exists. A magical crack. The kind a hacker can whisper into… and suddenly your […]