Posts

Update on the Free Cyber Security Search Engine & Resources built by this Subreddit!

MFA credentialed burp scan

Dragon city hack?

Hacker News: LastPass owner GoTo has been hacked

Intro to RFID and NFC

Weak ssl/tls certificate signing algorithm.

Bluetooth DOS

Creating a CTF: The Success of Flag Hunt Bangladesh

Community college freshman here; what's employment like in the field and what should I look for?

POV: 1 year later after graduation, u found an chromebook from ur school

mid-level rock band TIGERCUB changed their website to a blank password-input screen after releasing a single

can someone hack reddit and ban all mods from r/seattle permanently?

Build your custom Metaverse today with AlphaBatem Labs Metaverse builder!

ClamAV 1.0.0 LTS released | OpenSource AntiVirus | Cisco Talos

Are you aware of any methods to filter a MAC address in a local WiFi network wthout the admin password for the router configuration?

Potencional Google Photos Leak

Meta leaked 533 million users data

computer science majors be like...

OSINT | Full Course | Beginners

GeHot Opintions

Is it possible to change your IP without having a VPN?

Crypto scam

Special Character Identification?

Accounts and more accounts

Aulua wifi

2 Wireless Interfaces from One Wireless Adapter

cybersecurity interns on their first day be like...

BlackArch

Exploiting an N-day vBulletin PHP Object Injection Vulnerability

Code to circumvent Go's memory safety, allowing the reading and writing of arbitrary memory addresses without the use of "unsafe"

Hacker News: iPod Nano V6 LCD Hacking

Slip: a CLI tool to create malicious archive files containing path traversal exploits

Anyone learning ethical hacking as a hobby?

Introduction to RCE Exploitation (webinar)

Trying to understand if pdf brute forcing on a website works

is it illegal to send a zipbomb?

Certified AWS Red Team aka CART

brute force my old accounts

Nostalgia radio

Morally right!

Sigstore The Easy Way

I got a sketchy email and i clicked on it

Free wifi?

Villain - a Windows & Linux backdoor generator and multi-session handler that allows users to connect with sibling servers (other machines running Villain) and share their backdoor sessions, handy for working as a team.

Looking to find them

Specify rkhunter directory?

Overbearing Employer, https protocol inquiry

Is there a way someone can hack into my brothers old psn & change the email for the account.For a price theyre comfortable with?

How difficult would it be to remotely turn on someone's camera without turning on the light indicator?

Is offering "anonymous" cloud hosting for virtual machines and virtual servers a viable side hustle (cloud hosting you can register for anonymously and pay for in crypto)? Context: I would setup a "data center" in a spare bedroom consisting of used servers.

Viruses vs Factory reset

Just wondering does anyone have any resources on this simple thingy windows

Preventing a mac from establishing it's physical location

Possible attack"on 4g modem

Stingrays - legal?

It's legal I promise

Check out my walk through for Hacktoria's Lost at Sea CTF

I tried using an Ec2 instance to circumvent the geolocation barrier on Fanduel and it does not work at all.

how to make a raid bot 101

What do you consider a good hacker?

Hacking a 5g mobile broadband modem

Recommended hackerspaces?

Wireless adapter is detecting less networks than it used before.

DNS Cache Snooping Tool

10 Most Secure Linux Distros for Privacy & Security Concern Users

Brute force password with 11 letters all lowercase

Hacker News: $477M FTX ‘hack’ was a Bahamian government asset seizure

So I bend Rebar... this stupid machine runs windows XP and routinely tries to take my fingers off by just doing what it wants... (shut off turn back on all good right?)

Finding a job in computer security with a criminal record

New recon tool!

How you create characters for brute force

First time CTF

Is it Possible to Hack Lucky Crush?

Editing the UID of an arcade card

Taylor Swift Ticketmaster

Hacker News: Ask HN: Does GDPR and CCPA Apply to Hacker News?

Essentials daily tools

Can Github Copilot be gamed to make hacking easier?

Was I hacked?

Got Scammed, Want Revenge

Where to begin

Edit executable?

New challenge added to the CI/CD Goat CTF

Top 5 Hacking Tools for 2022- Best Hacking Software

Anyone have experience with telegram and the “hidden mobile number”?

Diablo immortal

Running stuff on a live flash/separate raspberry pi thing to avoid school restrictions

How would someone remotely place an overlapped IO on my pc? Basically my pc looks as it should but acts as if it is being monitored or controlled by someone else

want to Trade Original Bash Bunny for Original Shark jack Keychain

Top Zeus Botnet Suspect “Tank” Arrested in Geneva

How Travis Scott “Hacked” Streams To Fool Record Labels

Location; tracking.

Are hackers outside the US really that good?

Pool on the roof - November 14, 2022

Hackers threaten 10 million people's health records after the ransom wasn't paid

How much space for a bad USB?

Embedded projects

Bypassing root certificates? (iOS)

How powerful is the skill of knowing how to search for stuff?

how to become a hacker 2023

Are there wizards out there that can actually read a machine language (in hex)?

Hacker News: How to Hack the Simulation?

Hacker News: FTX hacker identity discovered by Kraken Exchange team

What are the chances of getting black hat hacker level malware on your pc?

Does something like barcode injection exist?

Sandbox detection popularity

Hacker News: FTX faces potential hack, sees mysterious outflows totaling more than $600M

Hacker News: FTX claims it has been hacked of all funds, website and mobile app compromised

How could a hacker ruin an email phishers day?

I’m at a loss. I have a stalker.

are there ways to tell if my rootkit had been detected?

Making a proxy for a game.

looking for someone who can get the number of a person through their email.

Looking for my singing monsters hack

How to setup Host-Only networking in KVM/QEMU/Virt-Manager?

How do NOP slides help in code execution off of the stack?

Getting the data from an old HDD (2008 - Western Digital - WD1600aajs 160 GB)

Links between Cicada 3301 and founder of WikiLeaks Julian Assange

anyone know of some vulnerabilities in Fivem?

Undiscovered vulnerability in modern cox networks?