Opus to Audio

For a tons of personal reasons I don’t use Whatsapp, I prefer Telegram instead but often I need to listen some audio files from Whatsapp that are in OPUS so to listen it I need to convert it, so boring, isn’t it? So I wrote a Telegram’s bot to convert it for me but better.

»

Glip

Using more than one device often I need to move some links or some datas from to another one, I need a simple and clean way to do that without logins, emails, codes and hard to remember links so I thought how to solve my problem using golang…

»

Go-ofile

The first phase in security assessment is focused on collecting as much information as possible about a target application. One tool to do that is Goofile, it allows to search a specify filetype in a specify domain using Google…

»

Go-odbye

One of the worst things that can be happens to a twitter user is surely to be unfollows but how to discover who unfollow you ? To solve this problem I create an ad-hoc offline and commandline tools to do that.

»

Hello World, NUCLEO

For academic purposes now I own a NUCLEO-F401RE board by ST Microeletronics, it works with STM32 microcontrollers, it is arduino compatible, supported by MBED, it has 3 leds and 2 pushbuttons on board; Obviously is fully programmable… but how ? Let’s do it!

»

New domain, new blog

Ok, I bought a new domain name; my domain name, so I think it’s right to make a new blog. From now I will post using only the english language to improve my knowledge about it and to share my thoughts to everyone.

»
Author's profile picture Domenico Luciani on Personal

ToxiProxy node client

I saw on github a nice tool to test my applications under certain networks and system condition to prove that my tests never fail…

»

SmagenBot

I use Telegram, whatsapp alternative messaging application, it contains more features than whatsapp and many benefits, one of these is the possibility to create bots and to try it I decided to make one just for fun.

»

The exploit that exploits you

At some point who is interested to become a programmer spend some time on the underground part of the field: the security field, in fact at least one time we played with exploits, bugs and vulnerabilities, at least one time we wanted to be a security professional.

»