Posts

Stolen HP laptop options?

Decided to try something else i saw on TV

Analyzing Malware with Hooks, Stomps and Return-addresses

Heath Adam courses?

Why?

yeah i ddosed my school

Is Yik Yak more secure in 2022?

SOCIAL BOT: My decision

Someone said they doxxed me. What now? Should I be worried?

So idk if this is the right place but, how could I bypass securely for chromebooks?

reverse engineered and documented United Airlines in flight API

Traitor now includes an exploit for CVE-2021-4034 (pwnkit)

I think someone was trying to hack me

Any reliable youtube channels?

Looking to bypass my school computers lock system, any tips?

If you have to start again

An offensive security toolkit written in Rust

Pivoting Lab

Does anyone still use Beast, Sub 7, Optix Pro etc?

How do hackers get so many emails?

IPTV Decoder

Why do political movements like BLM not have hackers working for them?

Finding vulnerabilities

ISP IPTV Decoder

2022 Windows 10 - Local Admin Reset

wholeaked: a file-sharing tool that allows you to find the responsible person in case of a leakage

Coinbase Phishing Attacks: A Step-By-Step Dissection

If you have installed any of the 470 infected apps, then you are one of the 105 million victims of Dark Herring android malware globally

Hacked IG

Docker, Containers and CTFs

Hacker News: She was a notorious hacker in the ’80s – then she disappeared

What hardware part of laptop can be traced and leaves cyber footprint.

Someone doxxed me as a joke and sent me photos from my deactivated IG… How?

Cracking the WORDLE game

A good book to learn about privacy and anonimity?

Anxiety kicked in, how long is the recommended minimum character length for your primary email?

Booby-trapped sites delivered potent new backdoor trojan to macOS users

Possible to bruteforce 1 out of 50 letters from veracrypt?

Hacker News: Hacking the Apple Webcam (Again)

I know this is a long shot

Is hack the box a good place to start

SQL injection against phishing attempts

How to always have access to an email?

Baby Cam might've been hacked

It looks like my SIM / phone number has been hijacked how?

WordPress Hacked

Hactivists say they hacked Belarus rail system to stop Russian military buildup

Alternative to Google Takeout?

Kismet, but for cellular/mobile networks?

Could AI create a vulnerability for hashing algorithms?

AI hacking

Sextortion

Looking for code to analyze

Is there a way a novice can check if their VPN is as good as it's stated?

My mistake, hacks, or lying friends?

Bet with my teacher

OSINT digital intelligence

Ghidra JDK home directory issue

dsicord hacks

Hacker News: Show HN: Hacker XP – Hacker News styled as a Windows XP Outlook email client

Should I install Kali on a virtualbox or should I directly install it as a dualboot?

I've seen a few posts here of interesting ways to do some odd things just for fun so I figured I'd share one that I did a little while back.

How to make a file undetectable by antivirus.

I dont think its possible...

What am i doing wrong on HashCat here?

claiming usernames on social sites via programs / code / bots

How do I track someones location live?

Payloads in Word/PDF documents: Is this still a thing?

Is SSRF via javascript possible?

First job in Cyber Security

Anyone know a FUD RAT for scambaiting?

iPhone and PC are hacked. What should I do?

Can a USB Mouse become infected with a virus?

Best Phishing Tools?

Welcome to pwn.college! Free Course for reverse engineering.

Getting Password Hashes for dictionary attacks

Fedora

Script or "real Hacker"

A little angry and don't know what to do (besides block and move on).

Exploiting bollard controllers?

What if you go back and start learning hacking from the beginning

Google airmon device?

Site Cloning and Credential Harvesting

Sites like z shadow

ARP Poisoning to become MITM and intercept traffic

Is email header "FROM" and "Return-Path" block spoofing possible?

Lastpass

Can't crack a VMK encrypted with TPM

Hacker News: Nerd-dictation, hackable speech to text on Linux

How to trigger old school wireless doorbell

Is it legal? Will I get in any trouble?

Capturing NTLM hashes with Responder

Revil Hacking Gang Arrested

WPS Pin not found problem

ARP MiTM question

Kahoot Game Finder

Hacking tools.

My mom is being catfished !

Someone is trying to hack me,what should i do?

using chrome remote access to enter a friend's laptop as a joke

Data aggregation snippets for software environments investigation

Cloning RFID stickers to bypass my fridges DRM?

Old school password manager

The HackerOne Global Top 10—Hacker Expertise, Industry Data, and Up-to-Date Vulnerabilities

YouTube suspended my channel for a video about disclosed on HackerOne issue in Grammarly

Stopping software forensics teams?

Potential backdoor?

I tried to make MITM tool in python for study purpose and i faked ARP request and sent it to the victim(vm in this case), why does the 192.168.1.1 mac address always return to the original and real one? the victim is kali linux but it did the same thing on windows 10

Why do I keep receiving "Bitcoin" e-mails?

First Move on a Hacked Home Network as the Attacker?