Posts

https://ift.tt/38PAB5I

EBook to physical book exchange?

Top 20 Most Popular Hacking Tools in 2020

Why the Future of Digital Identity Belongs on Blockchain

Unsend Email?

Is this really the only solution?

Dev finds Twitter exploit and fits whole game into an embed tweet

SolarWinds hackers accessed Microsoft source code, the company says

Cybersecurity expert Mike Hamilton discusses recent hacks and breaches - December 2020

Hacker News: SolarWinds hackers were able to access Microsoft source code

Ticketmaster fined $10 million for breaking into rival’s systems

Bypassing all VirusTotal's static detection engines with a malicious Office downloader, powershell script. See how easy it is to forge such malicious document with a step by step explanation of how static engines fail. With this method, organizations are easily compromised.

netmon_cli: A simple Packet Sniffer written in C using ONLY built in libs

Are Dictionary or Wordlist Attacks state of the art for wifi password cracking?

Hacker News: Ticketmaster will pay $10M for hacking rival ticket seller

Critical Insight Q&A on the SolarWinds Attack

What Are The Impacts of Poor Privacy Practices? [What happens if you get hacked?]

(2020/12/22) BITCOIN GENERATOR || EARN 0.2 BTC PER DAY || 100% LEGIT BITCOIN MONEY ADD + PROOF ✔️

Can emails be hijacked and never arrive at their intended destination?

4 Digit Pin BruteForce?

Command and Control Question

How to get in the smart thermostate

Did you know this recon-ng bug?

Using VPN to change region

Removing Computrace?

India: A Growing Cybersecurity Threat

Happy New Years

I made a collaborative environment for solving CTF problems, like Google Docs for hacking

microsoft teams

Beginner in C trying to reverse engineer my simple program

Extract information from any Google Account using GHunt

Does a Multiprocessor Environment effect the reliability of Exploits?

What Is SAST? Overview + SAST Tools

someone is invading our privacy

Did someone just get into my phone?

Trying to view connected devices using netdiscover on a Kali Linux VM using VirtualBox.

A response to a deleted post asking how easy it is to take over a machine. "How easy is it to enter someone?"

I got hacked.

Hacking an android app with hidden content...

How easy is it to enter someone ?

Wifi Pineapple Mk VII Cannot capture specific MAC addresses

Where do you buy your wireless adaptors from? (UK)

Looking For Programmers Interested In Joining/Contributing To An Open Source Security Organization

How to use Hashcat with Intel (R) UHD Graphics Card?

Someone claimed to hack me on twitter

is CIA/NASA/NSA etc. even hackable this day?

New Golang Worm Drops XMRig Miner on Servers

Making a VM look as legit as possible?

Kali Linux Meterpreter AV Evasion

Should I be worried?

Party trick special- bluetooth edition

Hacker News: Show HN: HackerDaily – What if HN updates only once a day?

Hacking Buzzwords

Twitch Mod

If you work without desktop environment (Black Arch) what happens if you want to use tools like Wireshark/Burpsuite compared to Kali?

CVE-2020-10148 (local file disclosure PoC for SolarWinds Orion aka door to SuperNova?)

Login screen on public wifi

hard brick android device

4-way handshake

jailbreak the nintendo dsi

Someone from Bangladesh is trying to get into my computer

A Major Wireless Network Flaw Is Still Being Exploited To Track User Locations

Proxy for Somaliland

Shows/ Movies on Netflix that weren’t available until this year

Investigators Blame Microsoft Corp For Hackings In The United States

Youtube ad on hacking facebook

token grabbers

Verizon Fios Gateway: 6 Unknown Mac Addresses

F@$ng tmux

Is open security worth it

Department of Homeland Security: China using TCL TVs to spy on Americans

Fun with IP address parsing

What is safest way to create a honeypot?

Russians Are Believed to Have Used Microsoft Resellers in Cyberattacks

Charles proxy not opening

Bypassing lockscreen on Samsung zflip

I want to begin writing my own external API's for software, but I'm not sure how to get started.

Justice?

Looking for a way to decrypt/clone contactless cards

Changing my cell phone's outgoing caller ID

hacking with a VM

Hacker News: Safe Hacking

Offering 2 Video Courses for Digital Forensics

Dating App bots?

Did the nsa just get attacked?

Medusa ssh port not open on target computer

Need advice on using aircrack-ng

Website template similar to GTFOBins?

Don't open in browser meme how does it work?

Where can I download leaked files for logins and passwords?

How to get rid of parent controls

Using BeatSaber and an android head unit to make a 14 year old car party to music like a Tesla model X by injecting CAN Frames

Pnewz.com?

What would you do?

Have you ever heard of the PJON protocol? Seems relevant here

Using beatsaber and android headunit to port the Tesla X Christmas lights show to a 14 year old Mercedes Benz!

[Click this at your own risk]: An*nymous group has a christmas gift for the world

CISA has released a tool to aid in detecting malicious actors in M365

This

Children of MAnsOn

Philosophy of A

Do we Know What Data Was Leaked in SolarWinds Breach?

Christmas Discounts

Hacker News: Hackers threaten to leak plastic surgery pictures

Virus

what are the best software to brute force winrar password?

Hackers threaten to leak plastic surgery pictures. REvil have 900GB in pictures after they attacked The Hospital Group - one of the largest cosmetic surgery chains in the country used by celebrities for everything from breast implants to liposuction.

Wordpress Arbitrary File Upload - A Case Study

Taking Over Wordpress Sites In Seconds

Software hacking - Amazon Echo 5/8

Understanding Hacking Process for Game Design

Mr robot season 4 killing the lights

Where would you start?

HalMakeBeep - Reversing A Tiny Built-In Windows Kernel Module [Journey from Kernel32 to HAL]

Happy Holidays from OWASP - looking ahead to a better 2021

Signal cracked?

WiFi hack?

GPS spoofing "Aloraplus" app?

A response to everyone looking for 'How to start'

MS Teams - One message that can install malware on your computer - XSS+RCE

AWUS036ACM or AWUS036ACH 3d model

Apple CarPlay

Cyber Security Researcher looking for a Solarwinds Download

Check this shiz

How safe is it to open a suspicious archive with a text editor?