Skip to content


In Memoriam: Hugo, A Companion Like No Other

In the whirlwind of my professional accomplishments, a personal storm raged. Hugo, my loyal canine companion of thirteen years, has taken his leave from this world. His absence is a void, expansive and deep, echoing the profound impact he had on my life. Each corner of my home, every mundane moment, is now a stark reminder of his eternal silence. Farewell, dear Hugo, you are missed beyond measure.

As I grappled with these personal challenges, my professional journey continued unabated, culminating in the fruition of my earlier efforts. It is with deep humility and profound gratitude that I share the recognition and rewards garnered for my work in the field of cybersecurity. I successfully identified and reported vulnerabilities within Samsung's systems, and I must applaud their security team for their exceptional spirit of collaboration.

Telia F1 (Changing DNS with Hidden Modal)

Telia's restrictions around their routers are well-known. Despite there being methods to circumvent their security barriers over the years, Telia seems to intentionally complicate a basic process like changing DNS settings on their Telia F1 router. It's as if they want to make it frustratingly inconvenient for anyone wishing to perform something as routine as customizing their DNS settings.

As such, we must simply proceed with the standardized procedure if you intend to change your DNS settings. However, we can also take it a step further and explore the extremely concealed settings that are carefully hidden and secured from users. We'll simply employ a little "hack," or to use a more neutral term, an "unhide" method. Let's walk through how you can do this:

Reflecting on the Technicolor 2018 Exploit

5 years later I have found a large number of exploits after more than 1000 documented hours I spent on this router and at least 20 different devices from different mistakes but oh how I have learned a lot in this time, therefore I want to present a small final part of this router as I am now going to continue with the Telia F1 which has the same problem but thanks to the hours I put in it is extremely easy to get into the routers from technicolor, but to sum up a short version for all the curious here you have the problems in Technicolor's routers. TO fix this, almost the entire router's third-party script must be rewritten.

Navigating Persistent Security Risks: A Critical Analysis of the 2018 Exploit, Unraveling Potential Entry Points Despite Latest Firmware Updates for Telia Customers. Five years have passed since the discovery of the 2018 Exploit in our ISP's router system. During this period, I have conducted a diligent search to uncover a comprehensive explanation of the exact cause of the exploit. Regrettably, available information seemed riddled with speculations and lacked a definitive account

Restoring Your Android Device from Factory Mode


Have you found yourself trapped in the SetupWizard activity on your Android device, unable to proceed or exit? This comprehensive guide provides a step-by-step solution to restore your device to its normal state and overcome the constraints of the SetupWizard activity using ADB commands and system settings manipulation.

The SetupWizard activity is designed to guide users through the initial setup process on Android devices. However, getting stuck in this mode can be frustrating, preventing you from accessing your device's full functionality. Fortunately, with the power of ADB commands and system settings manipulation, you have the means to break free from the SetupWizard activity and restore your device to its default state.

Hacking Android 12 - Motorola Edition (FRP Bypass)

In this guide, we will explore a method to bypass the Factory Reset Protection (FRP) on Motorola devices running Android 12. Specifically, we will focus on devices that have the GBoard app from Google pre-installed as the default keyboard. I have discovered a unique solution for this particular scenario, which has proven successful multiple times before

Please note that I have conducted all the procedures mentioned in this guide using a Motorola G50 device

Now, let's proceed with the method to bypass the factory reset protection on any Motorola device with the Google GBoard app installed as the default keyboard. By exploiting vulnerabilities in the GBoard app, we can crash it and gain access to the device's settings, effectively bypassing the protection. It's important to note that this method is specific to the current Android version (as of 2023-02-09) on the Motorola G50 device.

Tilgin TG275X Router Hacking Guide


This guide provides step-by-step instructions on hacking the Tilgin TG275X Router from Bredband2. By following these procedures, you will gain access to advanced features and settings of the router. Please note that hacking or unauthorized access to routers without proper authorization is illegal and unethical. This guide is for educational purposes only.

Please note that attempting to hack or gain unauthorized access to any device or network is against the law and can result in severe legal consequences. Always ensure that you have proper authorization and follow ethical guidelines when conducting any security-related activities.

Police vs Hackers: Debunking Misconceptions


Being a programmer does not make you a hacker. The term "hacker" actually refers to a playful cleverness and appreciation for creativity. One can be skilled in programming without possessing this playful cleverness, just as one can exhibit playful cleverness in domains unrelated to programming. For instance, consider Ingram Marshall's composition titled "My end is my beginning," which is a palindrome. This piece of music showcases cleverness and serves as a true hack.

Have you come across news headlines that conflate hackers with criminals? Unfortunately, such headlines present a poor example and should be dismissed. It's crucial to differentiate between hackers and black hats. The term "hacker" is often misused to describe individuals engaged in phishing, trickery, or data forgery without genuine technical skills. These individuals, referred to as "Black Hats," may misuse user data similar to how a hacker manipulates a system, but they lack the true essence of hacking driven by skill and a love for computers. A hacker applies their skills either for malicious purposes or to test the limits of individuals. However, being a hacker encompasses more than just being an adept administrator or a knowledgeable gamer.

Harnessing Random Devices: Stay Invisible

How we could use random devices to stay under the radar and shift blame onto others, and everyone is responsible for their own setups, right?

It has never been easier to utilize random devices to protect ourselves from various threats or to remain unnoticed by installing proxies or simply forwarding them. Nothing surprises me anymore, as I have been around for too long to be surprised. This demonstration involves around 10-15 devices, just to give a glimpse of what is possible and how easily we can utilize any router out there to conceal ourselves from malware hunters and make our adversaries accountable for something they have no knowledge of as the device owners.

Malware hunters should really consider the implications before providing IP addresses to random servers during their analyses.

Hacking Inteno XG6846


The Inteno XG6846 is installed in millions of Swedish homes and sits between the router and the switch. With some operators, it's a requirement for watching TV. Now it's time to take control of this device!

In 2022, a new law was introduced in Sweden allowing the government to hack people's devices regardless of whether they are criminals or not. I don't think this is a good thing, so I took on this challenge as a fun project. Here are the results

Taking control of Android 12 with Bixby's intelligent assistance

Works on all Samsung devices until Security Patch: 2022-02-01)

More information about the CVE from Samsung can be found here.

No worries, I've got you covered with a newer version (they are fast but not fast enough, so I decided to share this wiki with the public). This hack works perfectly for all Samsung devices with the latest security patch (2022-02-01). While the wiki was created on February 21, 2022, it still works awesomely. Please note that this method does NOT work on Android 11. If you have an Android 11 FRP locked device, you can upgrade to the latest firmware from Samsung.

I'm sharing this information freely because it's fun and because I can, and because I believe it's enjoyable to share knowledge. I never report exploits or security issues for money. For me, time is more valuable than money.