Posts

What keylogger *actually* works for windows that hasn't a GUI with it?

Russian Electric Vehicle Chargers Hacked, Tell Users ‘PUTIN IS A DICKHEAD’

Conti group chat leaks

how beginner friendly is « hacking: the art of exploitation » by jon erickson?

How would you find a target gateway from an entirely external stance?

Resource for different types of cyberattacks

Is http://norussian.tk/ actually doing something?

Ransomware Group Lapsus Claims NVIDIA Hacked Back After Its Attack On The GPU Giant

How does Anonymous manage to take down Russian websites?

Just stop war.

Peaky Blinders

Me have made a c# ddos app for russian government & bank, servers & hosts

Hacker News: Nvidia Fires Back at Hackers, Encrypting Stolen Data and Ransomed Their Systems

Omegle and connection

Likelihood of 🇺🇸 looking the other for those taking a stand for 🇺🇦?

Gmail Critical Security Alert

FOSS for training skills

Simple HTML DoS Script for Russian Sites

Rapper / hacker YTCracker talks about how Loyd Blankenship's work influenced his music on this new podcast

gift card cracking

Attack on Ukrainian Government Websites Linked to GRU Hackers - bellingcat

Hacker News: Ask HN: What do I need to learn to be useful as a hacker to defend my country?

Hi, i'm Gary Mckinnon. I was in the news for a decade after getting caught 'hacking' mil/gov systems looking for evidence of UFO/UAP. Ask Me Anything.

Russian Media rt.com acting up

NMAP Shark Jack Payload

Hacker News: A List of Hacker News's Undocumented Features and Behaviors

How do I find someone who doesn’t want to found?

Has anyone hacked a standard keyed vehicle ignition to be started with something like a USB drive or NFC tag?

All Google Products Scraped & Summarised

The Wiretap Channel for Capacitive PUF-Based Security Enclosures

How to back trace phishing

dnsspoof not working

How does backend server handles multiple clients over single TCP connection from load balancer?

How to reveal my windows 10 administrator password

best vpn thats has no banned servers and accepts bitcoin

Reverse engineering/Hacking challenge

So i ended up with what i thought its a dead pixel on my screen and it turned into this, cant close it, cant do nothing im not sure if its a virus or what

Using operators in js to exec code

Did it happen to you ever, a zip downloaded with no clear origin trigger ?

How would you add multiple filters on wireshark?

What Can Someone Do With Your IP Address?

This is my first time here, is there a good program for figuring out the password and username of an account on a website?

Hacker News: Show HN: I rolled my own simple support / Helpdesk SaaS aimed at Indie Hackers

SafeNet Sentinel Dual

Is there a crowdsourced ddos app or desktop application?

Has anyone successfully traced a spam ( text of email ) message back to it’s original source? If so, how?

Awesome tool to assist in monitoring your home network

Silverbullet

how do you make money with hacking?

How does phone number/SMS spoofing operate?

What are some educational tools to become a white hat hacker for a beginner?

cool new website that can hack a lot of stuff :)

Hacker News: The Elite Hacker of the Fsb

Russian cyber attacks on Ukraine

OpenSea Investigating ‘Exploit Rumors’ as Users Complain of Missing NFTs

Are virtual machines safe?

An old tool I made, but never shared here and just recently updated...

what can somebody actually do with an ip address?

Read it and weep, my children. -Pad

[debate] is it possible to get a virus from a movie file?

My buddies phone got stolen

OpenCamera hack for Pixel 6 Pro

Build a (very simple) Botnet with my new tool!

I am starting courses

I made a tool to find and stream public/misconfigured security cams

Hacker News: A Saudi woman's iPhone revealed hacking around the world

CVE-2016-9682: SonicWALL SMA/SRA

Is it possible to hack into someone's phone by having them download a picture

What Is Exploit Development?

How to create bouncing servers

Best 4 Identity Theft Protection Services for Small Business & Family With Big Insurance 2022

Cool podcast about infosec industry news and career guidance

A hacking group

Hackers slip into Microsoft Teams chats to distribute malware

How to detect the RedLine stealer

Hacking Via (What Appears to be) USB-C PD

Books on digital forensics?

I want to mass tweet an hashtag, what are the tools I can use? Any programs, bots or stuff like that?

Way to disguise/embed a ".exe" or a ".py" file?

Yo guys what spotify to mp3 converter do you use none i found work well and cant download the entire playlist

Automating the Recovery Process of a KeePass Password

How similar is the knowledge between cyber security experts and programmers/software engineering?

Detecting vulnerabilities in IoT devices

Career wise where could I go with hacking

Has the windows side of the razor synapse power shell exploit been patched?

People who act like DDOSing is hacking is honestly my biggest pet peeve

I think most of the people believe social media are controlled by the goverments, but why?

Is there a way to make a windows computer download a file and run it using a registry edit, spread via a .reg file

AWS Cloud Security Challenge - 2

Code virtualization resources?

The story of how was created the Brain-computer interface (Open-source DIY)

Community Access Device

Does anyone know how to get into an old Microsoft account??

I created another OSINT tool to find Instagram places and posts based on their locaiton

Hacker News: GiveSendGo Has Been Hacked

How do you find targets?

A friend says he's been hacked

capturing deleted files

Real and Scary Biohacking

How to take ethical revenge on extortion scammer?

Aspiring ethical hacker here, how much of networks should I know?

If I was to spread a virus over the internet but it was harmless, is that illegal?

Making a custom hacking desktop vs using a premade one like kali

Are Darknet Hackers real and reliable?

Book recommendations for practical and theoretical knowledge?

Hacker News: Programs that have saved Hacker News 100+ hours by automating repetitive tasks

What type of memory does my fopen() pointer point to?

Is it possible to hide the ip address of my own VPS?

Someone is trying to catfish me

With the possibility of an cyber attack looming over Ukraine what do you think would be the best way learn from the capabilities that are used?

Hacker News: Police hacking with Pegasus of key Netanyahu trial witness explodes into scandal