Posts

Hacker News: Hacker News RSS

Im sorry for asking but what is hacking exactly?

Can someonw explain how sql injection works?

Best tools for working with Android - P4wnP1 ALOA?

Are there any Free alternatives to Dehashed.com?

Not necessarily hacking, but how could I go about tricking YouTube into thinking my username is a letter when it is actually an invisible character?

Vulnerability Remediation | A Step-by-Step Guide

#scriptlife

Fire stick can they watch me?

call spoofing : i've been attacked

10 Types of Web Vulnerabilities that are Often Missed - Detectify Labs

Generating desired random numbers

Hacker News: Show HN: Hacker News with a twist

New Android Trojan Steals Millions of Dollars

Any advice?

WPA Wordlist used by gpuhash.me?

Image File Execution Options Injection (IFEO) Mitigations

CIA Vault 7: Remote Development Branch (RDB)

VoIP provider Bandwidth.com suffering DDoS attacks for 5+ days. Critical services affected including 911. Almost no media coverage.

My notes are publicly available on GitHub - still small, but growing. I am focusing more on quality - format, information, use of language, etc., so the process is a bit slow

What can a hacker do with a picture of a person (the person who got hacked)?

New leak of Epik data exposes company’s entire server

Can an employer see whatsapp Web?

A hypothesis

How do you find if a password has certain amount of attempts?

New way for malware to evade detection (involves attacking digital signature)

Shutting down someone's computer via chrome?

I'm trying to crack a Zip password (encrypted with PKZIP) with fcrackzip, but it doesn't work. What am I doing wrong?

Paying good money! for program that will do this for me

Message me if you can hack something for me

Massive Phishing Campaign Impacted 75K Email Inboxes

lets say i give u my ip address can u hack me

OSCP worthy?

How do you find someone's IP address using command prompt?

Utilizing proxy authentication and ssl bypass in order to get through a proxy

Resource for finding published exploits in web frameworks

Hacker News: Refined Hacker News

How Hackers—the Best Kept Secret in Cybersecurity—Can Help Your Organization Protect its Assets and Improve Security

Python Cybersecurity 101 — Build your own tools in 10 min

Hey everyone! My friends and I are hosting this workshop, BugéDex, for people to get started on bug bounty. It’s on the 3rd of October.

How malware gets into the App Store and why Apple can't stop that

TryHackMe - Opinion

Attempted hack of unknown email address

Is there some way to trip a motion detector from a distance ?

Study Links Remote Work and Cyberattacks

Keyloggers

Windows privesc with psexec -s cmd

Twitter

Malware Detection in Internet of Things Using Opcodes and Machine Learning

Car antenna booster?

How to brake my android password without lost my all data?

Where to learn for free?

Hacking or Cyber Crime Books suggestions

How do I deauth clients from a wifi network with Mac os?

Introduction to protected code

better pull the cord

A New Jupyter Malware Version is Being Distributed via MSI Installers

VPN recognition

Is it possible to somehow hack GPT apps?

Image File Execution Options Injection

Manufacturer Leaving WiFi Key on New PC?

Exploit code for three iOS 15 zero-day flaws published

Is getting a VPN really worth it?

Details of 106M Travellers to Thailand Exposed Following Data Breach

I don't know where to ask but maybe you guys have an idea... am I being watched through my laptop camera?

Hi all. I have an idea.

Hello there:)

How long should I be learning hacking until I do my first bug bounty?

How do I get the real physical MAC address of an iPhone?

An Indonesian local government website had been hacked by some crazies and then posted a threat to bomb/explode the Chinese embassy in Jakarta.

Someone found my public Ip through Skype and disabled my internet connection

GPS spoofing

Does any one have CVE-2017-14746 POC?

Vulnerabilities room for conceptual clarity

ripping high res map from a website

Brute forcing Password with Hashcat Mask Method

Microsoft WPBT flaw lets hackers install rootkits on Windows devices

Looking for a full band wireless spectrum analyzer for windows or linux

Honeypot

What can be done with an exposed api key?

Can i used a mesh router to connect to my neighbor free wifi?

What ports are okay to be open on home router?

Hacker News: Did a Chinese hack kill Canada's greatest tech company? (2020)

Awesome Repository of Useful Tools For Cyber Enthusiasts

Alfa network wifi card or something else?

Locking for an INSTACART BOT

Have a VPS with 6gb ram, 4 core cpu, and debian. It has a domain I pay for with a SSL

I created a site to check if your location is actually hidden (even with a VPN).

Asap

Injustice 2

What are the best uses for uncrackable programs?

MDK3 and Airgeddon not working

Did shaking right-click in the browser mean that my pc infected with something?

pWnOS v1.1 Walkthrough

Where to submit hacking challenges

Best token grabers?

Best laptop specs for hacking?

Why Russia is the perfect country to target with hacking

I Got a Laravel App KEY, how do i decrypt cookies using that key?

How would you attack my API?

Hacking the Google Nest Hub

What exactly is the Central Cyberspace Administration?

how to compile .afa, .qnd and .flat ?

Short history of hacking

So i have heard of a DDoS attack at my school. Is it possible to Counter-DDoS a DDoS attack?

Hello guys

Can someone give me an easy way to find someones username and password

This means my phone was hacked correct?

Cain and Abel

Does anyone know where to find old firmware updates for fitbit

Disclosure of three 0-day iOS vulnerabilities and critique of Apple Security Bounty program

My Phone Randomly Started Broadcasting a Stranger's Conversation?

Website crashes my browser at the same point.

Really interesting concept using a simple script for DNS DoS Attacks

Setting up a hotspot that proxies through burpsuite

Here's GETreqt, a slow-DoS attack that's kinda like Slowloris on steroids! What do you think?

Is there any way to defend against a Deauth Dos attack on your router?

I want to catch a scammer who had been ripping off my brother until he died last month. He's been dead less than 4 weeks and this person is now already hitting me up for money. Any ideas on how to get info on them to turn over to LE without scaring them away?