top of page

Search
All Posts

Jedi Oldenburger
Jan 225 min read
Creating a custom operating system similar to EncroChat’s
Creating a custom operating system similar to EncroChat’s for secure communication on a Linux base is not only feasible but has specific...
11 views0 comments

Jedi Oldenburger
Jan 224 min read
EncroChat Details - Technical Evaluation
EncroChat was a proprietary system, and the exact technical details of its encryption and implementation are not publicly documented in...
8 views0 comments

Jedi Oldenburger
Jan 224 min read
DUTCHJINN DOCUMENTARIES - SCRIPT 1: CRACK EPIDEMIC IN AMSTERDAM
SCRIPT 1 : CRACK EPIDEMIC IN AMSTERDAM SCRIPT 1 : CRACK EPIDEMIC IN AMSTERDAM PRODUCER: DUTCHJINN DOCUMENTARIES SCRIPT 1 : CRACK EPIDEMIC...
5 views0 comments

Jedi Oldenburger
Jan 211 min read
CRACK in AMSTERDAM by DutchJinn Documentaries
CRACK in AMSTERDAM Documentary by DutchJinn “CRACK in AMSTERDAM” by DutchJinn Documentaries. CRACK in AMSTERDAM Documentary by...
6 views0 comments

Jedi Oldenburger
Jan 153 min read
Dutch Police Intimidating Citizens Through Computer Intrusions: Hacking Investigation by CyberSecurityAD
Certain Individuals working in the Dutch Police Force Intimidating Citizens Through Computer Intrusions: Hacking Investigation by...
22 views0 comments


Jedi Oldenburger
Apr 4, 202419 min read
PEN-TEST RAPPORT
PEN-TEST RAPPORT RED MANGO 1 Opdrachtgever: ADNAN ENTERPRISE Opdrachtnemer: Peter Oldenburger CyberSecurityAD University of Applied...
10 views0 comments


Jedi Oldenburger
Apr 4, 202422 min read
OFFENSIVE PROGRAMMING CHAPTER 3 PETER OLDENBURGER
Page 1 of 46 OFFENSIVE PROGRAMMING CHAPTER 3 PETER OLDENBURGER Page 2 of 46 CONTENTS INTERCEPTOR-X .........................................
6 views0 comments
Jedi Oldenburger
Mar 26, 20241 min read
dhcp python script
#!/usr/bin/env python# Aangepast script met DHCP-verzoeken# (Shreyas Damle's script als inspiratie)import timefrom scapy.all import * def...
5 views0 comments
Jedi Oldenburger
Mar 13, 20246 min read
MITM ATTACK PENETRATION TESTING RAPPORT
MITM OSPF / PYTHON PETER OLDENBURGER CYBERSECURITYAD.COMMan-in-the-Middle Attack (GNS3) Peter Oldenburger CS105 Inleiding & Introductie...
9 views0 comments

Jedi Oldenburger
Sep 22, 20231 min read
Cyber Security AD Blockchain CSAD Cryptocurrency
Cyber Security and Blockchain Integration for Securing Education and Online Transactions Cyber Security AD Blockchain, CSAD...
33 views0 comments
bottom of page