PixelDrive
185 subscribers
49 photos
12 videos
11 files
31 links
Primarily hacking the cyber world, but we also play around with design and code
Download Telegram
Forwarded from Debugging Epohul (epohul)
I was meant to share this a while back. It's a really nice book, easy to follow and pretty up-to-date since it's published this year.

(Only 127 pages)

the book is in the comment
🔥3👏21
Democracy Install now or later
😭3👎1
Forwarded from Nahom G.
🌟 We Built AlgoWars at a Global Hackathon From Ethiopia

We joined Vercel’s “Prompt to Production” week in Addis Ababa — a global hackathon where teams build real AI projects from idea to working prototype in one night. The experience was intense, creative, and inspiring.

Our team built AlgoWars – Where Code is Weapon (@@fuauda) — a project that turns coding and logic into a competitive strategy concept, highlighting innovation, problem-solving, and engineering skills.

Now our project is live, and we need your vote to compete globally and represent Addis Ababa and Ethiopia. Every vote helps us move closer to the top.

How to vote:
1️⃣ Open → https://v0-v0prompttoproduction2026.vercel.app/browse
2️⃣ Sign in
3️⃣ Select Engineering from categories
4️⃣ Find @@fuauda (make sure look for the project with an image b/c there is a one )
5️⃣ Click Vote ❤️

Let’s show the world what Addis Ababa can build — your support makes a real difference.

#PromptToProduction #AlgoWars #Ethiopia
2
A neighborhood near Al Sheena is known for its sea of ~1,500 identical houses.
Same layout. Same design. Same structure.
From above, it looks efficient.
From a security perspective? It’s a monoculture.
In security, uniformity is a double-edged sword.
When every system, device, or configuration looks the same:
Management is easier
Deployment is faster
One vulnerability scales instantly
That’s why modern security focuses on:
• Segmentation over sprawl
• Diversity over uniformity
• Zero Trust over assumed safety

Resilient design looks boring from above but survives real attacks

@pixeldrive
Designed this last night looking at it in the light of day, i can see many problems

@pixeldrive
👍4
💻 Just started an intermediate course in Ethical Hacking.
​I’ll be spending the next few weeks focusing on [pick 1 or 2: Active Directory exploitation, Buffer Overflows, or Advanced Network Pivoting]. It’s a challenge, but that’s where the growth is. Stay tuned for some project updates!
Duration: 70hrs ~
Passing the exam on NetAcad

#Pentesting #HackTheBox #CyberSkills

@pixeldrive
I redesigned AASTU’s website.

If the slogan is “University for Industry”… why doesn’t the website feel like it?

I’ve always believed that a website is more than just information. It’s identity. It’s positioning. It’s power. And when I looked at the original site, I felt like something was missing a university that calls itself university for industry. they could've focused on the creation process, success, entrepreneurship. Education shouldn’t be a conveyor belt to industry


@pixeldrive
5🔥2
this is today's progress it's not finished yet there is a lot i have to add but i need to move to other stuff now

#Day5challenge #pixeldrive

@pixeldrive
👍1🔥1
So I made this using help of ai ofc 😅😅 optimized landing page for Highlights:
​Desktop-First Architecture: Tailored specifically for large-scale displays to ensure the 3D assets and typography maintain perfect visual balance.
​live model Integration: A custom-rendered 3D planet that serves as a high-impact focal point for the theme "cyber-game"
​Sleek Aesthetics: A minimalist navigation and brand-heavy layout, powered i don't think it was built for desktop screen descriptive

Link: Pixeldrive.vercel.app

@pixeldrive
🔥7
If you’re into OSINT, or just love exploring the internet’s hidden layers, you need to check out Shodan

Often called the “search engine for the Internet of Things” Shodan lets you discover exposed servers, webcams, routers, industrial systems, analyze vulnerabilities and security risks and more
👍1
😁3
TIP: Hacking is NOT a Crime ( hackingisnotacrime.org ) is a nonprofit organization that attempts to raise awareness about the pejorative use of the term hacker. Historically, hackers have been portrayed as evil or illegal. Luckily, a lot of people already know that hackers are curious individuals who want to understand how things work and how to make them more secure.
2
Stupid case: A company hires a consultant to fix a problem The company only calls a consultant when they have no idea what's wrong

· If the consultant doesn't know what's wrong immediately, they look incompetent.
· But if the consultant does know what's wrong immediately… how did they know without investigating? It makes the client suspicious. ("If you figured it out in five minutes, why didn't we?")
The Result:

· Act confused = You're useless.
· Act certain = You're a fraud.

There's no way to win. You either look straight dumb 😭😭 or look like you're lying 🙈✖️.

But here's where it gets weird:

So... Some consultants actually do know the answer because most companies have the same problems. But if they say the answer too fast, the client won't believe them. So my father said they have to pretend to discover it slowly

So the question:
If you have to pretend to be confused to prove you're smart… are you really smart, or just playing a game?

#workproblems

@pixeldrive
👏1🌚1