Posts

Hacker News: Father-son duo helped techies ‘hack exams’, earn top scores for big payday

Learning Go vs Python

When sending a deauther packet using a phone and a ESP8266, where are the packets sent from? The phone or the ESP?

What are cables that connects a ESP 8266 flasher to a phone charging slot called?

New here

Getting website analytics

Permit Empty Password for SSHD

Setup Home PC to be a remote desktop over the internet and now Polish IPs are creating lots of network traffic on port 3389.

Just a friendly reminder that VM’s are not 100% safe. Kinda shocked that i still hear people describing VM’s like they are isolated.

 Securing the Supply Chain by Working With Ethical Hackers

Hacker News: Back End Developers on Hackathons Are Not Needed

What ways can mobile phones(apple) get exploited?

Investing strategy automation

Any reliable deauther tutorial that you can run on phone?

Someone told me about a phishing scam they were trying to attempt by getting into someone’s gmail.

Dangerous or not?

What's the point of tagging hackers under terms such as hacktivist or grey/white hat hacker like we are cattle?

In Case Anyone is Interested: Hacking by No Starch Press

Hacking with C#

Learn Red Teaming & Malware Development for Advent Of Code

AutoRDPwn - The Shadow Attack Framework

A really funny story about me DDoSing myself

Nice site to buy breeched databases?

Winamp Source Code Leak

AIDS Trojan: The Story Behind the First Ever Ransomware Attack

How do some hackers manage to hack old Youtube channels?

[TCP Reset attack] how to set the sequence number directly with nping?

I am a student currently on online microsoft teams meeting. We used to be able to mute each other. That was sometimes annoying, but it was really useful when there was someone who forgot to mute their mic and did the annoying static background noise.

Who is the most famous and prolific black hat hacker of all time?

Looking for similar tools on github? What are your favorite tools on github?

Automatic target scanning

What should I learn next?

Would brute forcing a phone like this actually work?

WiFi blocking memories

SillyRAT - A Cross Platform multifunctional (Windows/Linux/Mac) RAT.

Execute ELF files on a machine without dropping an ELF

In os query how to get the list of files that a user can execute with sudo?

IKEA is battling an ongoing cyberattack targeting their internal mailboxes. Phishing emails are also being sent from other compromised IKEA organizations and business partners.

Bypassing a dormitory wifi that has quota

Brave browser is open source but still seems shady, what's the catch??

NMAP Scan

Reporting a bug

I might be in the wrong sub

Seeking opinions on Bug Bounties and whether they are 'good' for society/'bad' for society/inbetween/why?

I keep getting emails stating that there was unusual sign in activities on my Microsoft account. I was skeptical at first, but now I have reason to believe the worst. Have I been "hacked"?

Can hackers stop the delivery of emails?

M1 Macbook Pro for ethical hacking?

Is shovelware truly this prolific? How are there *billions* of new apps (or updates) to scan *every* day?!

Hacker News: My friends Instagram was hacked and deep-fake videos posted in less than 6 hours

Positive Hack Concepts on the word "Future" (1 min)

Linux/Windows/Mac - best PC for a vulnerability researcher job (mostly IDA, gdb, source codes IDE)

A new vulnerability in the OmniPod Insulin Management System allows an attacker nearby to schedule or immediately inject insulin

Simple Python Botnet Program

Can virtualbox interfere with using hashcat with GPU ?

What are some of your early security mistakes?

50 Hour FREE Network Security Course

What main OS do yall use?

Is it legit?

How to use tcpmux?

Reverse Email Lookup

Tried closing my Bluehost account, they asked part of my password for authentication.

CMS Hacking

Cracking firefox's logins.json without key4.db

Was I hacked ?

…something year old

Was my router hacked? Netgear Nighthawk R7000

Best password cracking software

To catch the boogeyman

Looking for Feedback on my Recent Hacking Project

Hacker News: Repairing an HP 3478A Multimeter with a Hacksaw

Software that can encrypt external drive and wipe all data at the same time?

How are black hats able still able to get away with attacks?

Is ratting illegal in Canada?

I'm paranoid because every time I sign into my email on google chrome it's signing me into "Person 2". Why am I not being signed into "Person 1"? Was I hacked?

Phantom - A multi-platform HTTP(S) Reverse Shell Server and Client in Python 3

How to hack a surefeed microchip pet feeder?

laptop sometimes makes a beep, but it hasn't a hardware beeper?

Hacker News: PostmarketOS Revolutionizes Smartphone Hacking

Is it possible to find geo location info from a twitter video

Today i saw a web extention in my browser named "new tab" (opens a website called hi.ru when new tab is opened)

The shellcoders handbook

Rookie here, encryption software recommendations before uploading to the cloud?

What could be behind my ONT?

I have a request.

Cybersecurity in the ROS 2 communication middleware, targeting the top 6 DDS implementations

Hacker News: Hacking CD/DVD/Blu-ray for Biosensing

Your Brain Against Phishing

Metasploit....

How does a TPM actually protect you?

zune 30gb

Does NP in GetNPUsers stand for Non-Preauth?

I need your advice

What stops someone from hacking a software they developed themselves?

How do I bypass router password?

Looking my dad's HTTP server

Tools to find out more about someone?

arp0_attacker - Kick devices off your network using basic ARP spoofing.

Hacking something big like NASA

Discord malware campaign targets crypto and NFT communities

Has anyone noticed this sub is mostly shit?

Hackers, how did you manage to build your botnet?

is it possible to download a song from a website using developer tools?

An interesting virus for my project.

What's stopping someone from posting a phishing link here on Reddit in a post or the comments section?

Experiences with card readers of any kinds

How do you Ddos your next door neighbor?

Best Laptop?

Halp

elegant way to attack and disable traffic to network node

Is ethical hacking legal for countering threats?

Obfuscating Beacon Traffic (Red Team)

Can i "reverse engineer" such website ?

Getting backup of whatsapp and maybe even notes ..

Creating your own C2 Framework

disabling screen mirroring app