Posts

[LOOKING FOR COLLABORATORS] Video game VDP programs and other binary bug bounty targets

Looking for a python script for brute force login

pi zero ducky

What are the most used alibis/excuses used in case of an hacker leaving real IP behind?

CTF on mobile

CSGO skin changer?

Breaking: Global IT services provider hit by ransomware attack

What do you think social engineering will look like in the metaverse?

Underground Hackers Black Market

Windows Process Listing Using WTS API – Part 2

Car hacking

FUD Keylogger

What is your favorite vulnerable virtual machine to hack?

Google review bots

Windows Process Listing Using WTS API – Part 1

Immunity Innuendo pricing

Does the utilman trick stil work?

Compilation of all known leaked credentials

I Scammed A Scammer & Gave The Money To Victims.

Geo location

An Average Normal User vs Someone deeply into Tech

Clinic for hacking plot in my book

Network Tracking using Wireshark and Google Maps

Can My Exact Location be Found?

Does anyone know of what breaches the COMB consist?

Publicly exposed routers

what is this type of attack called? i heard it referred to as "kiosk breaking" one time, but i cant find any info using that term online, does it have a name?

Can messages be removed from someone else’s phone remotely?

Trouble recreating Log4j with Minecraft

I clicked on a link that had http instead of https accidentally

In australia you can enter and start the crematorium from your smartphone

Hacker News: GitHub – hackerkid/Mind-Expanding-Books: Books everyone should read

Script or method to Bypass Windows 10 Login

Is there a way to make sure that the receiver of a message knows a message is from the sender and not a middle man, without the receiver first contacting the sender?

picking up where we left off about being Anonymous

scanning for proxies

Bots & Stalking

Crossposted from r/HowtoHack, any advice here?

What would be your methodology in this case?

Since the Official Coexistence Attacks On Wi-Fi and Bluetooth Chips Volunrability has been Published, We are Sharing This

MIT xPRO Professional Certificate in Coding

Rant: Hacking Nigerian Politicians

This week in the Console newsletter we interviewed Philippe and Thibault of CrowdSec. CrowdSec is a participative IPS which is able to analyze visitor behavior & provide an adapted response to all kinds of cyber attacks. I thought /r/hacking might be interested in reading the interview! :)

Hacker News: Ask Hacker News Weekly

Can I start hacking from an ubuntu machine or should I switch to kali?

what practices real hackers do to remain anonymous?

How are hackers tracked?

USB password

How much work goes into a kernel exploit?

Is possible to bypass keyless system through obd port? This guy made it with arduino

Working around a domain

I Hacked the Dutch Tax Authority and received this awesome award

PiZW2 + P4WNP1?

Did you ever try a Log4J exploit over a bluetooth speaker? What do you think is possible here..

Ratted but no trace?

Is it possible to gather user data of those who access other sites?

Application that decrypts CSV files

Auxiliator — telegram bot for basic web-application analysis

Log4PowerShell - A CVE-2021-44228 PowerShell Demo I Wrote

A hacking slugfest between Iran and its foes sparks fears of a wider cyberwar

Kronos Attack?

What steps should I take

can a mkv file contain a virus?

I made an open-source, command-line-based, journaling social network.

How do people create game exploits

My friend was hacked and we know who it was.

How to access Windows 10 user account that is connected to an online account?

What os do you guys use to hack in?

Deciding on Hardware. Any input is appreciated!

Google Chrome Appdata folder

I'm not sure if this is against the rules :/

Im being dumb

I don’t understand much about this topic tbh but is Collection #1 downloadable as a list of passwords? Where?

Pegasus

Top 5 Takeaways from the 2021 Hacker-Powered Security Report: Industry Insights

Developing an open-source C2 framework. A worthy pursuit?

Printer keeps printing log4j scans

Old School DVD PIN protection

Fake number

Will attack such as LLMNR, NBT-NS and MDNS poisoner cause any issue to internal network?

Advice

Want some info on hacking

Ubuntu Encrypted Home

How do hackers get caught stealing wi-fi signal?

Is it possible to encrypt my browsing data in a public wi-fi without using a VPN?

Malware analysis and obfuscation learning sources?

Is there anyway to narrow down search result to those from subscriptions and playlist only?

How to start with reverse engineering and hardware hacking

Cain and Abel in 2021?

Homomorphic encryption is a cryptographic method that returns an encrypted result to the data owner. Essentially, this enables third parties to process encrypted data while having no knowledge about the data or the results.

Physical access is the best access

How hard for non-hacker is to change device id?

I got phished. Looking for ideas on retribution.

I've reported over a dozen security concerns and vulnerabilities to my high school, and I'm unsure where to take the situation.

Learning Metasploit for SMB

Hacker News: Apple's hackish attempt to make PNG decoding parallelizable

I think I found an undetected malware... I think. What now? Do I report it somewhere?

I ddos attacked myself