Posts

How do I send a mass message to everyone logged into the university PC network on the same IP

How to actually find someone who can hack into social media’s?

I made an archive of a compilation of my favorite dictionaries. wordlists.7z. This link is for torrent.

Suggestions for unredacting badly redacted documents?

Moodle PDF

Looking for Anubis/Cerberus source code

Gmail spoofing tool

Supposedly there was a security breach for California School Applicants. How legit is this?

School WiFi blocker

Being ddosed even after changing IP?

Bad website.

Hacking music

Look at the last sentence, imo thats nice

Point of area

I want to troll a friend

PHP shell that work on Linux and Windows that looks like real terminal

Reddit

Finding original time stamp from photo sent over phone

Whistleblower: Ubiquiti Breach “Catastrophic”

DLL Hijacking Guide

Play any game on ps2 for free with usb and freemcboot

.7z brute force

Unemployment

How do I bypass internet restrictions on my Ethernet connection?

Updating Hooks for a dll injection

How to get a guy who scammed me out of $440’s IP address /any other info I can get for the police ?

Collection of hundreds of hacking and cybersecurity resources on GitHub

Email IP

Any signs of someone hacking you?

Regrading the Wattpad database leak

Hacking Java Application

not really hacking . just want to invite my FB frinds to like my page

Unable to identify a web enumeration tool

I found one of you guys in my server...

Looking for a place to get solid configs for Sentry (Or a coach to teach me how to create them) - any ideas?

Hacker News: How the United States Lost to Hackers

Hacker News: Ifconfig.co – Hacker-friendly “What is my IP address”

bruteforce exists, but has it actually ever worked?

GPU Password cracking

Shodan Sale: $4 per LifeTime Membership

Looking to hire

I read on here that Nulled.to is a "Skid forum". I don't want to give my money to a low quality forum. Which do you recommend?

Edward Snowman !!

Cloning dual frequency key fob?

Getting into iPhone.

Hacker News: Work Force: Frederick W. Taylor offers some productivity hacks (1911)

Where should i go to learn about the hacking community?

I want to start hacking.

Best CLI app for android?

Hacker News: Amazon Security Staff Reported Its Own Tweets as “Suspicious,” Fearing Hack

My sealed-box brand new laptop is stolen, can i track it with serial number?

Hackers backdoor PHP source code after internal repo hack

India's biggest fintech hack

ForceBindIP issue

I know hacking is connected to programing so i was wondering anyone know work at C++

Guide to Stack Buffer Overflow (OSCP)

Got attacked by an ENFP RANSOMWARE

How to reset terminator terminal emulator?

Barnaby Jack

Setup for ethical hacking phone

Can someone in the Navy hack into my phone?

Cryptography

New 5G protocol vulnerabilities allow location tracking

Local admin vs domain users in local admin group

Who writes software cracks and how do they work?

Is Ubuntu easier to hack than Mac?

Hacker News: No, I Did Not Hack Your MS Exchange Server

Some bastards hacked r/scary.

Laptops recommendations for a budget of $1,500

Links or forums that teach how to make a ID badge cloner

Sharing My Private Methods

How is Jim Browning connects to the scammer's computers and see what they are doing?

Hacking my 4G Hotspot Dongle from China

How do you capture traffic and decrypt it?

How to have a medical device with a screen with a custom lock out?

How would you be able to view who someone is emailing/texting/calling on wifi?

Can an email address be added to the sent to folder after the fact (hacked)?

learn csrf attack by exploiting a vuln app - free - no signup.

Does this paper imply that an opportunity exists to hack into free energy to power our homes or devices? Are people already hacking the 5G network for power?

Protect my system drive from any tipe of attack

We are cybersecurity researchers who wrote a book teaching people how to hack the Internet of Things, called Practical IoT Hacking. Ask us anything!

Old fashioned email exploit

A study in Nature shows that 5G generates enough electricity to power low-profile IoT devices; suggests these devices can fit onto any surface

Offloading hashes to separate PC

Internet tips

Can I use Alfa AWUS1900 for monitor mode and packet Injection in Kali Linux?

CREATING EDUCATIONAL LAB ON IOT Security

Tor

Hey guys and girls 😅

CTF Walk through

IP Logger Backfired?

Can new hardware have malicious software on it?

hide a bitcoin miner in a pc without creating "suspicions"?

How bad is this?

Mysql dump

SSL Security

Best way to test an AV/EDR Solution

This guy is a pedophile and sent jerking vids to my 13 year old sister, Reddit please do ur thing

are passwords in website databases usually hashed?

Google's unusual move to shut down an active counterterrorism operation being conducted by a Western democracy

Employer hacked for a second time

Hacker Spotlight: Interview with manoelt

crashing school pcs (video for details)

So... about a Linux system.

Beginners guide to Reflective DLL Injection

Audit Node Module folder with YARA rules

Security researcher reports data leak to nonprofit, hears from the police

T-Mobile, Verizon, AT&T Stop SMS Hijacks After Motherboard Investigation

T-Mobile, Verizon, AT&T Stop SMS Hijacks After Motherboard Investigation

Tracking down error light & dark

U.S. Carriers Fix SMS Routing Vulnerability That Let Hackers Hijack Texts

4 family members phone hacked

Legality of a client

Black Kingdom ransomware begins appearing on Exchange servers

How do I display TCP SYN flags using wireshark?

US General says attacks by foreign hackers are 'clarion call'

SSH Host Key Change

Was it ever really possible to change your school grades?

how to bypass sophos firewall ?

Any kinda "normal" way how to sent keylogger into teacher computer during online class?

I have very little experience with IOS, are there any current exploits that bypass SSL Pinning?

Best VPN?

Looking for an app to capture wifi handshakes on android

OpenSSL Security Advisory (CVE-2021-3450, CVE-2021-3449)

Hackathon: Golem (the Ethereum Sleepin Giant) + Gitcoin GR9 Hackathon, up to 30k USDC in prizes. There's also a special category where you get to work on some dope projects from MIT Solve

XSS how-to covering: Absolute basics, types of XSS, contexts, discovery methods, polyglots, basic filter bypasses, event attributes, escalation methods, short payloads, bypassing SOP and edge cases