payloadgiovanni.hashnode.devZero Trust 3:16 β How Stone Cold Used Vault and Okta to Protect the WWF TitleI remember hearing glass shattering and the thunderous pulsating music echoing throughout the area while watching Stone Cold Steve Austin walk in the arena. Channeling the energy of my childhood heroes from the WWF Attitude Era, I decided to build a ...Jul 13, 2025Β·3 min read
payloadgiovanni.hashnode.devHydra-Password Hacking (Tryhackme Write Up)It's been awhile since I've done a TryHackMe room but I'm back ! I'm currently in school for Cyber Crime and Digital Investigations , however how can I solve a cyber crime if I don't know how criminal think ? Pentesting will give me the critical thin...Apr 12, 2024Β·2 min read
payloadgiovanni.hashnode.devTraffick Stop: How OSINT Can Be Used To Fight Sex Trafficking π₯Sex trafficking is the crime of using force, fraud, or coercion to induce another individual to sell sex. Examples of sex trafficking include illicit massage parlors, strip clubs, escort services, prostitution, and the porn industry. As a famous rapp...Dec 29, 2023Β·2 min read
payloadgiovanni.hashnode.devPnB Rock ( Darkside of OSINT Part II)I spoke about the dangers of geolocation and OSINT in my Pop Smoke post. It's very unfortunate, that Pnb Rock suffered the same fate. Geolocation, refers to the use of locations to determine the whereabouts of something or someone. If anyone clicks o...Sep 8, 2023Β·1 min read
payloadgiovanni.hashnode.devI Always Feel Like Somebody's Watching MeEveryone knows that our phones collect personal information about us. I always wondered how much information Apple obtains from the iOS software! Are our photos encrypted or can someone know personal information if they were to get their hands on it?...Aug 16, 2023Β·2 min read