Posts

Spoofing first time mobile app downloads

Hacker News: A DIY plate reverb, hacked out of IKEA parts for under $100

In regards to email phishing?

Router as wifi adapter?

how much damage can a website do?

Hackers hide malware in James Webb telescope images

Is there any way to establish a secure connection in LAN (WPA-2)

22 OSINT service for vulnerability detection that can be utilized in IT security.

What are methods in figuring out who is behind creating multiple social media accounts to slander someone?

Printing locked pdf files

bruteforcing physical safe

An iOS devs safety

hello from New Zealand!

Glitch to farm channels points on Twitch

Great Upcoming Hacking Competition by the Zero Day Initiative, pwn2own

Is there any conceivable way to trace the origin of Proton Mail emails?

How much money have you made from hacking

Can i have some advice with beef? i am conflicted.

Which one would you pick?

Not really "hacking" but had no other idea of where to post this lol

Is there any way of getting my account back? The account is still located on the system and I own the system Still.

How likely is someone to hack into my account

Rubber ducky untraceable reverse tcp

MacroPack - will simplify antimalware solutions bypass and automatize the process from vb source to final Office document or other maldoc payload type. This tool can be used for red teaming, pentests, demos, and social engineering assessments.

Hide IP when using NetCat listener

Is there a Super Mario 64 hack that uses the gigaleak Luigi AND his voice clips that were found in that leak?

Apple claimed iOS 16 would end the zero click exploit. these guys think differently

I was attacked by .qqjj ransomware, I feel raped

Sandbox Detector?

Bypassing JS paygate on a MIDI file download site

Hacker News: Hacking Photosynthesis

Mac AppleID locked - am I SOL?

OpenCV installation on Raspberry Pi Bullseye

Is there a way to remove a password from a encrypted disk?

How do owners of sites like unicc or intck hack cards?

Router breaking a Router, Just F those Passwords (Physical Access Required)

Find and block leaked API tokens

PrivEsc Question Regarding PATH Variables

How do I get into decrypting powervu satellite TV channels?

Snusbase vs Dehashed

Defcon 30: Tor - Darknet OpSec By a Veteran Darknet Vendor & the Hackers Mentality (full talk)

The ULTIMATE list of 100+ Python Security tools

Future of Hacking

What’s the first exploit you found on your own that you’re able to post on Reddit?

Tor: Darknet Opsec By a Veteran Darknet Vendor & the Hackers Mentality by Sam Bent aka DoingFedTime (FULL VIDEO)

Adding payload list to burpsuite free edition

downloaded and re downloaded kali linux a hundred times

activator patching cracking

Hacker News: VC Website for Hackers

NodeMCU upgrade possibilities?

Preferred VM for opening malware?

is there a good way to mask my os from a network

Fake DDoS protection pages on compromised WordPress sites lead to malware infections. Recently security experts from Sucuri, spotted JavaScript injections targeting WordPress sites to display fake DDoS Protection pages which lead victims to download remote access trojan malware.

How is IoT botnets even a thing when the only write-able folder is /var or /tmp and both gets reset every Restart ?

How do I change my grades on online portal for when parents check it

Can one get Hacked if someone knows their IP Address?

Possible to hack “Tom’s Key Simple Key replacement kit”?

Hackers steal crypto from Bitcoin ATMs by exploiting zero-day bug

Been trying to retrieve software from a locked Mac desktop computer. Every attempt has failed thus far. Any advice?

who agrees ?

Hacking BeReal - A practical lesson on “Man in the Middle” attacks

Germany // College degree

How did someone manage to get into my Apple TV at home?

how do I know if something is an IP address

I am starting a 160h bug bounty challenge

Bit of a weird one..

Best Residential and Mobile proxy provider ever!

how to use an activator?

Help with flags and masking for hashcat command

My usb rubber ducky scripts don’t work like they should.

Any recent data leaks?

I’m a noob/retard. Can someone recommend the best RFID reader?

Why does PHP XSS code not execute server-side?

How do people make coupon generators?

what r all these 2nd dairy operatr for n y dose the source code to them keep changing language

Researchers Hacked SpaceX Operated Starlink Satellite Using $25 Modchip

Multiple Vulnerabilites Discovered in RPA Vendor Blue Prism.

Want to use Fern on my own network

Google addressed a dozen vulnerabilities in the Chrome browser, including the fifth Chrome zero-day flaw exploited this year.

Good starter SDF radio for radio hacking ?

Any way to hack wps that times out or locks to prevent you from getting the password?

Anyone know of some sort of physical camera that can capture the entire screen of your monitor?

subdomain takeovers

Is it possible to access PC with just the Ethernet cable?

Nmap

Hacking Projects

New USB Rubber Ducky runs its own structured programming language

Evil Twin

Laptop wifi on Kali VM

Is it a bad idea to connect to tor 24/7?

Idk how to do this school challenge lol

How do I get started with hacking?

How do you setup a malware analysis sandbox?

I have a amazon Kindle fire tablet (1st version of 2011), what can i do with it?

Russian moves in upstairs - Google search suggestions now in Russian?

unlock Samsung s9 network provider

I want to hack people lol

Android Phone stolen, device turned off, any way to track it?

Whats a good port scanner (free)

Was wondering something…

Is there a BurpSuite bash type to CLI?

What’s your most successful password list for wifi hacking?

Finding an errant garage door opener.

I'm getting tracked down from buying insta bots.

How I Hacked my Car

Hacker News: The Zoom installer let a researcher hack his way to root access on macOS

How do you read webpack minified js files for XSS and stuff

activating gift cards on my own?

Hacker News: Hacking the Hedonic Treadmill

check blackhatworld

Serious version of raid forums successor

how far is too far

Starlink Successfully Hacked Using $25 Modchip

Someone just ordered on my Grubhub

How to trace a fake phone number that keeps harassing me from random numbers?

Post was deleted not sure why..??? BIOS password on G8 Elitebook.

Conti extortion gangs behind surge of BazarCall phishing attacks

Hello Room :-)

New to hacking, if I could even qualify for ‘new’, and maybe this is more of a call to arms, but is it just me or is it curious that no ones made an attempt to hack gas station pumps or servers en masse as a big “f u, this ones for green energy”? Data leaks, consumer hacks & exploits seem so… 90s