Posts

Computer Science, Cyber-security degree or OSCP?

How to long will it take to calculate all permutations of a password of 16bytes HEX with a high end GPU?

Advice on hardware upgrades

Hacking long term

Loading Meterpreter in Memory using Reflective DLL Injection

Rookie

Getting a password with email

Asking for my Grandmother

ShellPhish doesn't generate link

Ryuk ransomware report from CERT-FR. A nice aggregated source of info.

What are the skills to hack humans?

I just heard this sound from my phone while browing reddit. It sounds like a human eating something in front of microphone. Wtf is going on? Can someone explain it?

Top certification in this community

Cracking a Hash that could be one of those Random Password Generated String

Is their a couple of tricks you use when you’re hacking

Which one better? Dual-boot kali with windows, or in VM better?

Is the COVID shift to Home Office a massive security vulnerability?

Hacker News: Universal Radio Hacker: Investigate Wireless Protocols Like a Boss

Any free/good crypters?

Best Places for finding good developers?

Harassment

Aanastasiaaa25 running hack attacks

How do I download the data from yahoo's finance page?

Idk if console hacking is allowed here but... is this sort of hack possible?

a hacker had me open a file in my virtual machine

Coding Malware in Java? Benefit of c languages?

Being target by a hacker

did we ever discover the man that hacked the ring security system

MyLittleAdmin PreAuth RCE Vulnerability Analysis - How to detect, exploit, prevent!

Meta soloist on windows

Made my own script for auto-completing Spanish exercises

What are some commonly used python libraries for hacking?

How do i learn how to hack

Hacker Spotlight: Interview with Geekboy

Can a windows device be hacked from inserting a USB without executing any internal programs?

My first python script word_picker

The Rise of Misconfiguration and Supply Chain Vulnerabilities

What should I know before making bootable USB for Kali Linux?

Multiple services go down at once?

High schooler builds real-time AI to play CS:Go. Nice video with complete explanation of the whole process. It has automatic data annotation, cloud training, game integration and explains CNNs. The resulting AI is able to detect and shoot enemies in the game in real time.

Is there any way to identify mac addresses?

hi im not into hacking i love it and have love for console exploits.

Farmers have to hack their own tractors to keep them running.

Hacker Poster - Creating a Vibe

An Exploration of JSON Interoperability Vulnerabilities

Private router on university network

Hacker News: So, you want to be a ROMhacker? (2006)

A weekly security recap: The critical VMware flaw, Clubhouse app eavesdropping, SimpliSafe Alarm System hack, NK Cryptocurrency theft

Is it a security risk?

I feel like I am a victim of omg cable hack. how do know for sure?

MicroSD with audio stories showing no audio files...

Sniffing Bluetooth keyboards packets?

can i prevent being tracked through tik tok

Someone from the u.s came to my country and put a fake collarbomb on someone as an extortion attempt. He was caught by tracing his gmail address to being used at a public library. What's the most careful he could have been to avoid being traced? A live cd?

What would be gained from hacking a FB account?

Does anyone know how to hack into one of these and shut it off? SamSara CM32 dashcam ?

Google trying to put Microsoft on the spot at SolarWinds hearing - POLITICO

Store/Website to download bootable usbs/disks?

Caller Id spoofer app for Android

Network Administrator View

Kali Linux 2021.1 Release.

Getting passwords

Exploit network clear text Windows 4624 logon type 8

Hacker News: Hackers Tied to Russia's GRU Targeted the US Grid for Years, Researchers Warn

best way to find vulnerabilities?

email address

This is gonna be real fun!

Looking for ctf partners

How does someone get my ip address

Are there any tools for DDoS which doesnt have any malware? Or everything is infected?

The Ethical Hacker Who Shuts Down Scams Targeting The Vulnerable

Oyabun 2.0

Does anyone know how I can hack Microsoft password i tried the recovery but it’s and old phone number I’m pretty new to hacking.

Single band vs Dual band wifi adapters.

Storing password as hash?

Is there a sub dedicated to specifically hacking websites/servers?

Any rss channel specialized in CVE

Idk how

Siphoning data from a computer through "processor sounds?"

Is there anything preventing over-the-air or powerline attacks against Apple's secure enclave chips?

Can someone explain what exactly is going on here.

Windows and Linux Privilege Escalation

EternalRomance, EternalSynergy, EternalChampion, what's the difference?

How does a hacker find out "where" to hack exactly?

Password Cracking question, what do we use instead of rainbow tables?

Can I get hacked from answering a dm or following someone on insta?

The NSA's most powerful leaked exploit?

Win10 password reset

Our colleague did not care about security and we pranked him

Moodle hidden grades checker

browser block

Found my old laptop from school about 8 years ago... forgot the admin password. Is there any way to recover my files and programs?

Assistance for students' sake

Exhausted from studying

regedit, cmd and gpedit.msc disabled by admin

How do I know if my wifi adapter supports packet injection?

How would one reverse engineer a USB based remote for an embedded device?

Capturing traffic sent by iPhone on my own network

Are you a noob? You want to hack? Sounds fun?

Hacking Step-By-Steps to run Demos?

Projects

Hacker101 CTF Level 0

I want my wifi to slow down more and more.

What computer should I get for hacking?

How to Find Out Name of Someone at Concert?

US Arrests Six Alleged Cyber-Scam Money Launderers

Get router model number using the mac address only(not just the vendor name) useful for phishing attacks especially when used with WifiPhisher

Hacker News: The Apparent Kia Ransomware Hackers Are Demanding Millions in Bitcoin

I'm not sure if this is the right place but desperate for an answer here

Can anyone bypass the serial key screen on the content browser of this software?

Can I program a Seytonic Malduino Elite with teensy.exe?

My bug bounty target leaks an internal domain name. What could be done to investigate this further?

New browser-tracking hack works even when you flush caches or go incognito

How to start a career as an Ethical Hacker?

Cerberus CTF

Can someone use Kali Linux in a Virtual machine and hack with it as if it is installed as a main OS?

r/kali4noobs

How to set up a Kali Server on the Cloud for Free

Look for nice, small, demonstrable hacks understandable for laymen

Got myself a Pricer brand ESL

Almost got scammed by hacker

Web scraping Apple ID for crack - further info in post

Logging open wifi networks