Posts

assuming no faults, how can a router be attacked for it to lose its internet connection?

Chinese Hacking group "Cicada" exploits anti-virus in new attack

I ended up leaving a trail after accessing sensitive documents at work. I think I'm gonna be fired, I'm shaking.

Phone Goeolocation

White House invites dozens of nations for ransomware summit

A technical analysis of Pegasus for Android – Part 3

Hacker News: Chokuretsu ROM Hacking Challenges Part 1 – Cracking a Compression Algorithm

The Secrets Behind Uber's Breach

This is gonna be interestingly weird!

what are good web application/vulnerability analysis tools?

Hacker News: How Iran can track and control protesters’ phones: hacked documents

what do you guys when bored/ want to have fun?

Can someone steal my GDrive files if I ran an unknown code in Google Colab?

Migrate PowerShell process to another process via process injection?

change router wifi settings

I’m getting hacked really bad can someone explain how exactly though. Someone is remotely doing all of this too and I can hear them screwing with my electricity so if that’s connected idk. My network is also hacked

Best resources to learn windows/active directory

How to hackers protect when they do port forwarding?

Where is the best place to learn BINARY EXPLOITATION!?

Is it possible to get an IP behind an ngrok server?

What are the USB Rubber Ducky payloads you just cant live without?

Quite an Emergency

Chaturbate hacking

Rooting the Samsung Galaxy S7 Edge?

Is disabling your webcam on the device manager options a good defense against somenone hacking it?

Am I Stupid?

Hacker News: Bit Twiddling Hacks (2005)

any tips or wisdom you guys can share with me in regards to email analysis?

GitHub - karimhabush/cis-vsphere: A tool to assess the compliance of a VMware vSphere environment against the CIS Benchmark.

Anybody have promo codes for Halloween?

Game server Remaking...

Bad USB not on USB

new hashcat rule set

Can a iphone x become completely useless with IMEI or serial number?

Bootable USB Kali linux

GitHub - liamg/siphon: Intercept stdin/stdout/stderr for any process

Reverse Engineering Games

password list generator PWD

Bank Australia scam calls/SMS...

How to / Is it possible to run a python script in quantum computing online ?

topmostp: A simple CLI tool to retrieve the N top most used ports

I'm not allowed my own router's password

other ways to earn with whitehat hacking then bug bounty?

DEV-0832 (Vice Society) opportunistic ransomware campaigns impacting US education sector - Microsoft Security Blog

Was given a free pass to a local Cyber Security Summit, anyone here been to one of these? How was it?

PyUSB and usb.core with python

I can't find all the photo metadata using exiftool

Got hacked - want revenge

Stupid two steps verification

Hacker News: Programming Is Forgetting: Toward a New Hacker Ethic (2016)

Victim of ARP/MITM, want to know how

Extracting resources from an old game from a defunct company.

Important stuff to learn for a beginner?

Found this 37 year old gem stuck in my mom's house dresser. Yes, it was mine.

Can I SMS intercept without hackRF?

Flipper Zero Alternatives

Google FRP Lock bypass for Samsung S7 Edge.

Adrian Kwiatkowski, how was he doing it?

Hacking Signal Messages

VPN’s

Check out this video on the basics of ethical hacking!

Recovering lost password on docx?

Self signed certificate fingerprint authentication

found an interesting USB stick, wanna see what's on it but in a way to minimize risk

how to hide and use a trojen

Clash of Clans Hack

Getting into an email

Cobalt strike vulnerability found

Is there any way to take advantage of the free "messaging" wifi onboard aeroplanes?

Is using a Bluetooth speaker secure?

Proxies

Found large Australian news corp API & SSO Keys

NRA Releases Full Trove of Data Critical to Russia’s National Security

Really cool resource for understanding AD attack surface and TTPs

Curious on possibilities of changing variables on a video game's web application, in the console section of devtools

How to verify a valid corporate email?

Is there any way to hack Chrome to force it open all links in Incognito Mode by default?

gashjgioahniogp; oiwergm oiprewtj

Cold boot attacks possible on iOS / Android devices ?

Is there a CLI for searching breached website databases?

(Leaked) Advanced Combo List Editor 30+ Modules

Universal bootloader HU/H STEALTH this side down rev:6.0 ? Any info is greatly appreciated (sorry if this breaks rule #9)

Ways to clone a Doorking microplus 8069?

Fantastic Rootkits: And Where to Find Them (Part 1)

Is there a way to hack into the Gabb Plus phone from Gab Wireless so that I can add the Amazon Music app for my child, since we already pay for it? Thank you!

A New Attack Surface on MS Exchange Part 4 - ProxyRelay

Rats?

Career in info-sec?

Decentralized, private and anonymous

A Detailed Analysis of the Gafgyt Malware Targeting IoT Devices [PDF]

Anyone going to SaintCon next week?

Quantum Hacking @ DEF CON 30

Vögel stabilizer app is crap and doesn't work

Someone spoofing or hacking around this are...lol..

OSINT on a pvt social media account?

Alfa AWUS036acm worse signal than built-in wifi?

How do you make a HomeLab?

Pool on the roof - October 17, 2022

is there any way to trick a VNC?

hacking a cell phone camera

My account of Twitter was suspended for identity theft

Master's capstone project - home lab + reports

Wifi speakers

Unhackable machines

are there specialized people that solve how to make a machine unhackable?

Is there anything wrong with publishing a ransomware code?

Decrypt files after ransoware attack ?

Protect .mp3 USB Fob

any other aussies?

Wifi card not stable.

Openvpn no-log

Is it possible to move data from a money (credit) card?

Multi decoder website useful for CTFs

Does this exist?

What info can u get from hacking into wifi with other people on?

I got this.. and he knows my password...

Is their a way or anyone working on adding quantum cryptography to the tor network

Janus (String obfuscation tool based off the CIA's Marble Framework)

What info,programs, meta,etc can be extracted from this sentence(of tools?), etc? It's bunched together. -Thanks.

how do i stalk a pedo that was creeping on me knowing im 14? i wanna expose him to his family and friends.