Posts

Oscp best HTB rooms?

My apple iCloud ID got hacked

Random group chat of phone numbers similar to mine with random text

Finding out who stalks your page on FB--is it chronological?

Best TryHackMe rooms to prepare for King Of The Hill?

Finding identity of Craiglist poster by hacking them? How easy is it to hack Craigslist? Is it possible?

How can SOC analysts stop ransomware from spreading with Network File Sharing?

USB sdcard reader can it autodeploy software

any takers?

I think this might be the right subreddit for this

Can I get video games hacks for ps4

TUTORIAL - HOW CAN implement a DDos Attacks in python - THIS JUST FOR EDUCATION

Making a usb rubber ducky with only a stock usb

How to write a Trojan in Python - just for education for white hacker

Airpods stolen

Prank on my school.

Handling dictionaries & leaks like a pro

Lawful Hacking: Using Existing Vulnerabilities for Wiretapping on the Internet (2014)

Hacker News: Blizzard Recruiters Asked Hacker If She ‘Liked Being Penetrated’ at Job Fair

Anyone looking to make some cash?

Vulnerability Assessment I A Complete Guide

Best SAST and DAST for web applications

Websites other than Have I Been Pwned

How to get the password of a .rar file?

Attack AI systems in Machine Learning Evasion Competition | Microsoft Security Blog

How to know if one is dealing with a hacker for a good cause, or a nefarious?

Snap 👻 Bug

What these 16 USB internet sticks are doing there?

Menu driven wordlist generator in C++

Anyone know any good tools for generating stageless payloads?

How could I transfer simple artwork into touchscreen movement / input

In Todays World How Easy Is To Hack And Be Hacked?

Hacker downloads close to 300k personal ID photos from Estonian gov database

Are cryptocurrency exchange hacks easier?

Hacker News: Hacker downloads close to 300k personal ID photos from Estonian gov database

Is IP grabbing legal? (For non-malicious purposes, or for fun)

Can we know who was the intruder in a zoom meeting?

Keybase group

Stolen MacBook

How unique am I?

Passing Google OTP?

I have a school Chromebook with securly on it enforced by administrator and I was wondering how I can unlock sites that are blocked? 📷

options to prolong an android/meterpreter/reverse_tcp knowing it will soon be removed from target device?

Is there a way to get ip addresses from people around you

made a computer virus that shut downs the computers usability.

Is it worth looking into an even deeper level beyond transistors?

Does anyone know what is this URL and what is this do?

How a program can run by him self ?

How a program can run by him self ?

Do you consider ddos/dos hacking?

Behind a young woman, Marcella Flores hid hackers affiliated with Iran

How to deaktivate Windows Defender

Password cracking - sequential vs random

Reverse Email Search available in Australia?

Anyone have any troubleshooting tips for a rubber ducky??

What’s the worst that can happen with reflected XSS?

Hacker News: Hack NFL data using Postgres (and maybe win your fantasy draft)

Google launches new vulnerability reward platform

Are there any good books worth reading about hacking?

VPNs and ISP Providers

Residential Proxy and Virtual Machine

Malware developers turn to 'exotic' programming languages to thwart researchers

Why you should never hardcode passwords

SID (Security Identifiers)

Whatsapp Support kinda sucks

Confusion as to where people get their knowledge from.

Is it possible to do a sort of "SQL injection" via a robocall's speech recognition?

Can an office hack your phone while you’re working?

Writing Cybersecurity into Mystery Novels

I want to learn how to hack an IP

Deauth attacks and WPS

Texting from unknown numbers

Decompile DVD Menu Coding?

How to hack a wi-fi wpa2 net?

I got hacked

Local Bluetooth fingerprinting

Scammed from trust wallet

Defcon 29 Badge Hacking Live

Permissions and verification in mac downloads.

Is The Fanatical Cybersecurity Bundle Worth It?

How would you fake a long time history for a new website?

Which one can be much more suitable to start for a newbie on these topics? Malware Analysis or Reverse Engineering?

Begginer looking to try NanoCore

Bash bunny in the cloud

Is there a way to bypass the verification on Cash App?

I think i'm getting hacked. What do I do ?

Hacker News: I Hacked My Standing Desk with a Raspberry Pi

Cable box hack

What Book Should I Read Next?

Im freaking out!

A not too expensive but good VPN

How to create yor own pandemic causing virus

is there a way to make metasploit not remove temporary files after en exploit?

Network Tracking using Wireshark and Google Maps

Is there a way to delete a subreddit if you are not the owner?

Does iOS log incoming call data somewhere in program files?

Secure Messaging

personal blog for write-ups

Hacker News: Hacking Is the Opposite of Marketing

Routers and Residential Proxies

Residential Proxies and Virtual Machine

AWS GitHub script thoughts

Has anyone built a basic cantenna that worked really well? What was your secret?

Well, all about a beginner

How do exploits even happen?

Ransomeware decrypting tutorial ?

banning people of a country from internet

How to upload YouTube videos without copyright claim?

Join a small team of hackers on different levels

Bluetooth risk with bad apartment neighbor?

Security Feature on US Mint Silver/Gold Bullion Coins

Breaking into my old iPhone 6

Find lost device with imei and ip

Serial Swatter Who Caused Death Gets Five Years in Prison

What We Can Learn From Recent Ransomware Attacks 

Using VPN and popular tips that will not save your phone from Pegasus-like hacking READ ! IMPORTANT