Posts

How to identify types of chips in cards and cloning them?

A good TCP Network proxy?

Is it possible retrieve data from RAM?

probably wrong sub but

Would somebody mind analyzing a script for me?

Looking to get into a laptop with Windows 8.1 installed.

Ways to tell if your computer is compromised?

should I delete my second user in my pc?

I've been wondering for a while: how do 'hackers' feel about the intelligence gathering part of the process?

Bypassing ISP owned router device codes

Over the course of the past four months

your opinion on what companies like google do with all this data they have collected from everyone.

Ed – Darknet Diaries

Dstike & spacehuhn deauther v3

Hacker News: Applying the hacker / engineering mindset to Spirituality

One of my favorite gaming servers (Salty Gaming) had its entire server box hacked. The hackers are demanding money.

Removed CMOS battery on laptop, BIOS password still there

Is there a way to take screenshots of the Netflix video player? And is it legal?

Best place to transfer crypto to cake

I clicked an IP grabber link, what do I do now?

Someone not on my insta can see my private profile.

What are some good subs, sites, resources for learning about custom phone ROMs?

DDoS Attack Case analysis, GET Flooding Attack Type

Defence against DDOS?

Looking for software "cracking" programs.

What would you do with a rooted Galaxy A3?

I advice

Inside the World of a Scam-Busting YouTuber

It's Time To Think

Install Kali Linux in the cloud in a second

Hacker News: Please Save Hacker Lab

DIY Devices

Hackers scan for vulnerabilities within 15 minutes of disclosure

How tf is aggressive crawling illegal

How does encoding and escaping prevent LDAP injection attacks?

The Confluence hardcoded backdoor is pumping customer data to infosec researcher

Wardriver.uk

The real world implications of Firewall Evasion, Detection, etc.

Hackers-Arise Cybersecurity/Hacker Starter Bundle

Hacker News: Show HN: I built an email marketing tool made for indie hackers and solopreneurs

2013 iMac was reset and may have MDM lock

Final Year Projects (IoT based)

rdp

Im being blackmailed

Something happened a few years ago.

Hacker News: Why are McDonald’s Self Service Kiosks so hackable?

xss waf bypass

My hard drive is denied admin priveleges and I can’t reset my pc install apps or even open task manager. How do I remove the os and wipe the hard drive do I get a new hard drive?

Payload scanner site that does not submit to AV Companies

iOS app hacking - Zap

Am I being targeted?

Are there advanced phone number look ups?

Rat-ToolKit. Python script for writing and using exploits

Clarification on Zone Transfer (axfr) missing subdomains

Arpspoof not working second time round

Would anyone like to join a CTF group that started from r/hacking and is climbing the ranks?

How to analyze a disk dump without a file structure

What about "The Great Londini"?

What is the weirdest item you’ve ever hacked into?

YouTube Scam-baiters: deserved skepticism?

Would like to learn about malware and how it is implemented

Anyone know how to find a SHA256 hash of a file

Is there any way to block Microsoft Remote Desktop directly from my router?

Hacker News: Commenting on Hacker News

(Reverse) SSH tunnel from work over HTTP(s) proxy to a home computer behind NAT?

I got hacked what should I do?

Reverse engineerd BLE RGB leds so I can controll them when not home. Or make custom triggers.

Bash bunny script for retrieving hashed user password in Mac OSX High Sierra

has "Samsung" hacked my router or smh? cuz i have blocked it and it's still showing up from time to time..

what are the methods to crack a password?

how are the people who made things like cicida 3301 are so skilled in software development, cryptography, hacking etc.? how can be become like them ? What should we learn from where ?

complicated Crunch password generator

Explained: The Crema Finance Hack (July 2022)

Popular vehicle GPS tracker gives hackers admin privileges over SMS

Anybody have use for a device like this? It's a WiFi and BLE enabled IMU module with integrated Li-Ion battery charging capability

Is it possible to hack into an establishment's CCTV?

I am looking for phone numbers from other states.

Is this source good?

Speeding up network recon.

What paths are the most common ones to find the file system on a webserver. ?

A Deep Dive Into the Residential Proxy Service ‘911’

Can anybody chat with me and explain a bit about general hacking?

Benchmark Analysis: Annual Pentest and Code Review Coverage

Is Bitlocker bulletproof?

Pet peeves or how not to write a hacker

Searching across github

Does/Can Hacking Physically Destroy Hardware?

If you pwn a server, how would you profit from it?

Downloading a Database When Connection is Interupted

How does Shodan grab RDP screenshots of Windows machines, post-Server 2003?

'.' has connected to my chromecast and now PS4

private email server

Memory dump tool? Experience in dumping RAM?

Cruise Photos

Did email get intercepted in flight, or what happened here? (Scam)

List of real steam usernames for spamming fake login website

recruiting for theVOID CTF team

Hacker News: “Shit Academics Say” Twitter account hacked, Twitter Support refusing help

Mobile forensics explained

can I use nc for privilege escalation

Is it possible to hack into ps4 and unban an account?

What made Russian Hackers get so much hype?

is wpa and wpa2 possible to crack nowadays ;

How to figure out who hacked my LinkedIn account?

ffuf txt file defined, but not found in headers, method, URL or POST data

What Your Organization Gains by Understanding the Value of App Security Testing Averages

stealing logins with cookies

ffuf can’t find txt file

ffuf command not working

How to find online friend's real name