Posts
How to long will it take to calculate all permutations of a password of 16bytes HEX with a high end GPU?
How to long will it take to calculate all permutations of a password of 16bytes HEX with a high end GPU?
- Get link
- X
- Other Apps
- Get link
- X
- Other Apps
- Get link
- X
- Other Apps
- Get link
- X
- Other Apps
- Get link
- X
- Other Apps
- Get link
- X
- Other Apps
- Get link
- X
- Other Apps
- Get link
- X
- Other Apps
- Get link
- X
- Other Apps
I just heard this sound from my phone while browing reddit. It sounds like a human eating something in front of microphone. Wtf is going on? Can someone explain it?
I just heard this sound from my phone while browing reddit. It sounds like a human eating something in front of microphone. Wtf is going on? Can someone explain it?
- Get link
- X
- Other Apps
- Get link
- X
- Other Apps
- Get link
- X
- Other Apps
- Get link
- X
- Other Apps
- Get link
- X
- Other Apps
- Get link
- X
- Other Apps
- Get link
- X
- Other Apps
- Get link
- X
- Other Apps
- Get link
- X
- Other Apps
- Get link
- X
- Other Apps
- Get link
- X
- Other Apps
- Get link
- X
- Other Apps
- Get link
- X
- Other Apps
- Get link
- X
- Other Apps
- Get link
- X
- Other Apps
- Get link
- X
- Other Apps
- Get link
- X
- Other Apps
- Get link
- X
- Other Apps
- Get link
- X
- Other Apps
- Get link
- X
- Other Apps
- Get link
- X
- Other Apps
- Get link
- X
- Other Apps
- Get link
- X
- Other Apps
- Get link
- X
- Other Apps
- Get link
- X
- Other Apps
- Get link
- X
- Other Apps
High schooler builds real-time AI to play CS:Go. Nice video with complete explanation of the whole process. It has automatic data annotation, cloud training, game integration and explains CNNs. The resulting AI is able to detect and shoot enemies in the game in real time.
High schooler builds real-time AI to play CS:Go. Nice video with complete explanation of the whole process. It has automatic data annotation, cloud training, game integration and explains CNNs. The resulting AI is able to detect and shoot enemies in the game in real time.
- Get link
- X
- Other Apps
- Get link
- X
- Other Apps
- Get link
- X
- Other Apps
- Get link
- X
- Other Apps
- Get link
- X
- Other Apps
- Get link
- X
- Other Apps
- Get link
- X
- Other Apps
A weekly security recap: The critical VMware flaw, Clubhouse app eavesdropping, SimpliSafe Alarm System hack, NK Cryptocurrency theft
A weekly security recap: The critical VMware flaw, Clubhouse app eavesdropping, SimpliSafe Alarm System hack, NK Cryptocurrency theft
- Get link
- X
- Other Apps
- Get link
- X
- Other Apps
- Get link
- X
- Other Apps
- Get link
- X
- Other Apps
- Get link
- X
- Other Apps
- Get link
- X
- Other Apps
Someone from the u.s came to my country and put a fake collarbomb on someone as an extortion attempt. He was caught by tracing his gmail address to being used at a public library. What's the most careful he could have been to avoid being traced? A live cd?
Someone from the u.s came to my country and put a fake collarbomb on someone as an extortion attempt. He was caught by tracing his gmail address to being used at a public library. What's the most careful he could have been to avoid being traced? A live cd?
- Get link
- X
- Other Apps
- Get link
- X
- Other Apps
- Get link
- X
- Other Apps
- Get link
- X
- Other Apps
- Get link
- X
- Other Apps
- Get link
- X
- Other Apps
- Get link
- X
- Other Apps
- Get link
- X
- Other Apps
- Get link
- X
- Other Apps
- Get link
- X
- Other Apps
- Get link
- X
- Other Apps
- Get link
- X
- Other Apps
- Get link
- X
- Other Apps
- Get link
- X
- Other Apps
- Get link
- X
- Other Apps
- Get link
- X
- Other Apps
Does anyone know how I can hack Microsoft password i tried the recovery but it’s and old phone number I’m pretty new to hacking.
Does anyone know how I can hack Microsoft password i tried the recovery but it’s and old phone number I’m pretty new to hacking.
- Get link
- X
- Other Apps
- Get link
- X
- Other Apps
- Get link
- X
- Other Apps
- Get link
- X
- Other Apps
- Get link
- X
- Other Apps
- Get link
- X
- Other Apps
Is there anything preventing over-the-air or powerline attacks against Apple's secure enclave chips?
Is there anything preventing over-the-air or powerline attacks against Apple's secure enclave chips?
- Get link
- X
- Other Apps
- Get link
- X
- Other Apps
- Get link
- X
- Other Apps
- Get link
- X
- Other Apps
- Get link
- X
- Other Apps
- Get link
- X
- Other Apps
- Get link
- X
- Other Apps
- Get link
- X
- Other Apps
- Get link
- X
- Other Apps
- Get link
- X
- Other Apps
- Get link
- X
- Other Apps
Found my old laptop from school about 8 years ago... forgot the admin password. Is there any way to recover my files and programs?
Found my old laptop from school about 8 years ago... forgot the admin password. Is there any way to recover my files and programs?
- Get link
- X
- Other Apps
- Get link
- X
- Other Apps
- Get link
- X
- Other Apps
- Get link
- X
- Other Apps
- Get link
- X
- Other Apps
- Get link
- X
- Other Apps
- Get link
- X
- Other Apps
- Get link
- X
- Other Apps
- Get link
- X
- Other Apps
- Get link
- X
- Other Apps
- Get link
- X
- Other Apps
- Get link
- X
- Other Apps
- Get link
- X
- Other Apps
- Get link
- X
- Other Apps
Get router model number using the mac address only(not just the vendor name) useful for phishing attacks especially when used with WifiPhisher
Get router model number using the mac address only(not just the vendor name) useful for phishing attacks especially when used with WifiPhisher
- Get link
- X
- Other Apps
- Get link
- X
- Other Apps
- Get link
- X
- Other Apps
- Get link
- X
- Other Apps
- Get link
- X
- Other Apps
- Get link
- X
- Other Apps
- Get link
- X
- Other Apps
Can someone use Kali Linux in a Virtual machine and hack with it as if it is installed as a main OS?
Can someone use Kali Linux in a Virtual machine and hack with it as if it is installed as a main OS?
- Get link
- X
- Other Apps
- Get link
- X
- Other Apps
- Get link
- X
- Other Apps
- Get link
- X
- Other Apps
- Get link
- X
- Other Apps
- Get link
- X
- Other Apps
- Get link
- X
- Other Apps