Imagination is more important than knowledge. For knowledge is limited, whereas imagination embraces the entire world, stimulating progress, giving birth to evolution.

Albert Einstein
  • Editor in Chief: Ziyahan Albeniz – [email protected]
  • Editorial Operations Manager: Cansu Topukçu – [email protected]
  • Chief Business Officer: Oğuz Aydınyılmaz – [email protected]
  • Publishing Coordinator: Şahin Solmaz – [email protected]
  • Legal Advisor: Mehmet Pehlivan – [email protected]
  • Translators: Hakan Özer, Zekvan Arslan, Atalay Keleştemur, Nuri Çilengir, Enes Özen
  • Advertisement and Subscription: [email protected]
  • HQ: Hobyar Mah. Cemal Nadir Sok. No:24/178 Cağaloğlu – İstanbul/Turkey. Tel: +90 0212 514 68 61


  • Set up your VPN with My Connection
  • Introduction to Cryptology
  • Chain of Independence: Blockchain
  • Revolutionary Blockchain Technology: Is it safe?
  • Thoughts on Meltdown and Spectre Vulnerabilities
  • Vulnerabilities of Bluetooth: Past and Future
  • Why you shouldn’t store sensitive data in javascript files
  • The art of Data Hiding: STEGANOGRAPHY
  • Acting on the Sly: Overcome Obstacles with DNS Tunnelling
  • Possession is Nine-Tenths of the Law: User Agreements
  • The King’s Naked: Constraints of Blockchain
  • Signal Intelligence: Methods of Signal Listening and Analysis
  • How to be a shareholder of Google: Double your income with Google Adsense
  • Anonymizing Internet from the Router with OpenWrt and TOR
  • Cyber Security Conferences – Ayşenur Burak
  • WiPi Hunter Detecting – Besim Altınok
  • Web Application Firewall (WAF) Bypassing Methods – Ulaş Fırat Özdemir
  • Taking Control of Admin Account on Active Directory using the DCC – Girayhan Menekay
  • Dynamic Host Configuration to Root – Barkın Kılıç
  • Offensive Touch to Defensive World – Halil Dalabasmaz
  • Simone Margaritelli Interview – Utku Şen
  • Denial of Service – Bener Kaya
  • A Young Hacker in the Corridors of a Holding at Midnight – Yusuf Şahin
  • Revolutionary Blockchain Technology – Mustafa Yalçın
  • How I hacked into a college’s website! – Aditya Anand
  • Meltdown, Spectre and Foreshadow – Chris Stephenson
  • The Dangers of Wireless Networks – Besim Altınok
  • Cyber Security Conferences – Ayşenur Burak
  • Cryptology In Industrial Revolution – Bayram Gök
  • The 10 Biggest Hacks Of 2018 – Arka Kapi Magazine
  • Back To The Old Tech: Offline Communication Networks And Security – Utku Şen
  • Waf Bypassing Methods Part 2: Tricks And Indirect Access – Ulaş Firat Özdemir
  • Mini Threat Intelligence – Mert Sarica
  • Krack (Key Reinstallation Attack) – Ulaş Firat Özdemir
  • Daniel Bohannon Interview – Utku Şen
  • The Role And Comparison Of Operating Systems In Mass Surveillance (Qubes Os, Tails Os, Subgraph Os) – Furkan Senan
  • The Ss7 Protocol And Potential Dangers In Gsm Networks – Murat Şişman
  • Aprs: What Is It, What Does It Do And How To Use It – Murat Kaygisiz
  • Key Exchange Problem In Public Key Cryptography And Keybase – Recep Kizilarslan
  • Oldest Of The Hackers I – Bill Gosper – Cansu Topukçu
  • Technical Constraints Of The Blockchain Projects – Mert Susur
  • Cyber Security Conferences – Ayşenur Burak
  • The Future Of Security And Reliability – Chris Stephenson
  • Cryptology Front Of World War Ii The Enigma Encryption Machine – Bayram Gök
  • Secret Sharing Systems – Ceren İnce
  • Database Attacks And Protection Methods – Ömer Faruk Colakoğlu
  • Malware Programming And Lockdown Virus – Bener Kaya
  • Network Programming With Scapy – Güray Yıldırım
  • Siber Yildiz 2019 Writeup – Esra Nur Soylu
  • A Security Guide For Your Android Device – Arka Kapı
  • Signal Intelligence Signal Listening And Analysis Methods – Murat Şişman
  • Julian Assange – Cansu Topukçu
  • Cyber Security Conferences – Ayşenur Burak
  • Sigintos – Murat Şişman 8 Network Packet Programming Ii – The Python Scapy Library – Güray Yıldırım
  • Google Vs. Authy Security Wars In 2fa – Ulaş Fırat Özdemir
  • When “random” Numbers Aren’t Really Random – Chris Stephenson
  • Ipfs (Interplanetary File System) With Permanent Web – Mustafa Yalçın
  • No Room For Antiviruses In The Future – Utku Şen
  • Password Cracking Attacks In Wireless Networks – Besim Altınok
  • Blockchain Applications And Security Problems – Mert Susur
  • Birthday Attack To Hash Functions- Halit İnce
  • Cryptology In The 20th Century: The Electronic Age – Bayram Gök
  • Cryptocurrency Monero (Xmr) For Those Who Want True Privacy – Arka Kapı
  • Cyber Security Conferences – Ayşenur Burak
  • Copyright Projects Based On Blockchain Technology – Mihraç Cerrahoğlu
  • Make Your Own Messaging Application With Signal – Murat Şişman
  • Great Threat In Eduroam Academic Networks – Besim Altinok
  • The Ship That Got Hacked Ashore – Esref Erol
  • Client-Side Static Analysis In Web Applications – Mithat Gogebakan
  • Encrypt Your Disks With Bitlocker – Arka Kapı
  • Oldest Of The Hackers Ii – Richard Greenblatt – Cansu Topukçu
  • Our Fellow Confidant, RSA – Bayram Gök
  • Prophecies For The Next 30 Years Of Cybersecurity – Utku Şen
  • Cyber Security Conferences – Ayşenur Burak
  • Out-Of-Band Attacks – Ömer Çıtak
  • Leave No Trace Behind – Tails (The Amnesic Incognito Live System) – Ziyahan Albeniz
  • Source Code Review For Python – Caner Özden
  • Stay Hidden On The Internet: The Onion Router – M. Enes Özen
  • Manage Your Passwords In One Place: Keepassxc Key To The Empire Passwords! – Arka Kapı
  • Balance Of Good And Bad In Cybersecurity – Utku Şen
  • Being Free In The Open World – Nuri Çilengir



+90 212 514 68 61
Hobyar Mah. Cemal Nadir Sok. No:24/178 Cağaloğlu Istanbul/Turkey