Posts

what can ya do with a hacked printer? (jetdirect? port 9100 vuln)

Setting you up for failure: Exploring 2FA bypasses in web app settings pages functionality

Sending e-mail with sender same as receiver

10 Ways of Prevention Credential Stuffing

How to De-encrypt videos which can be played only in specific apps?

I’m being blackmailed.

What are ports in network ?

NOOB here How to extract data from a server

Tech-Tools and ThumperDC

OWASP Juice Shop: Hacking A Modern Web Application

Gift card theft

What are some potential implications of AI for hacking?

Starting to Earn Certs: Ethical Training.

I start college for computer science and I am looking for the best windows Laptop( I want to spend nothing under $1200)

Phone Number

Neighbour’s Wi-Fi

how to make a metasploit payload for android completely unnoticeable

Sorry probably not the best place to ask this, but this is the best place I could think to ask

Is There Anyway to Bypass Microsoft Family Curfew?

Turkey attacking Denmark... We will burn your servers.

Is it possible to set a computer on fire by hacking into the battery or is that just movies (designated survivor)?

Am I chasing a rabbit? (JS in plain text)

Hacker News: Kevin Mitnick Hacked California Law in 1983

Is Game Hacking Still Relevant?

Inquiries on Raspberry Pi

Does anyone recognize this website? (Used to buy “spotify lifetime” off of nulled)

Warning: New Telegram account hacking method, “give” string search attack

Data of every Austrian citizen leaked

How do I hack into a baby monitor

Help finding a test app for hiding a payload in

DoJ says it 'hacked the hackers' - Hive Ransomware nailed

what skills should i prioritize to prepare for CCDC qualifiers?

Hashcat / JTR

Feroxbuster, Gobuster etc. on HTTPS

I have a Galaxy S7 phone that is completely worthless unless I can put a new operating system on it.

*FULLY ETHICAL* What is the worst that I can do with a pc connected to a school network

How to use packet sniffer? (WireShark)

I got rejected by BPO/Call Center during an interview because I told my hobbies are cybersecurity and spoke about stingray!

google reviews

Moving file from poop device

Modifying Edimax BR6208AC V2 firmware

Looking for a team to do some CTF or bugbountys

How to scan for hidden fileservers?

Hi, I'm Csaba Fitzl, Lead Content Developer for macOS at Offensive Security. I'm doing an AMA on Wednesday, February 1st, 12 - 2 pm EST. Ask me Anything about macOS.

Best value VPS provider to host Kali for CTF's?

The DARK side of VPNs

Microsoft confirms ‘multibillion-dollar investment’ in ChatGPT - Hackers are already abusing ChatGPT to write malware, have you tried it?

Proxy resources

What Laws would you be breaking here?

any good python libraries to connect to networks with

Active Directory

which one is best for beginners: HackTheBox ou TryHackMe?

Does anyone here think you can view private insta profiles through something like a proxy?

Is it possible to get a virus from a licensing keys? 🔑

How to get ChromeOS to boot to Linux and keep all files.

Anyone have experience with udacity's Ethical Hacker Nanodegree program?

Trouble with verifying email and logging in using Selenium and requests

Google Rewards Indian Hackers with $22,267 for Reporting Security Flaws in Cloud Services

How to get into intranet by having access to PC in this intranet

Malicious text messages. Attempted hack? Or spam?

Getting past locked hard drive

Did my mother buy an illegal IPTV Box?

If I connected to a wifi with a phone then disconnected and forgot the wifi in the settings, if someone got a hold of the phone can they find out where the wifi was connected?

Hacking paid antivirus apps on phones

What can I do with a custom security key?

Getting admin passsword

Nim reverse shell. Now with more features.

Stay vigilant.

Somebody pirated my app

If someone entranges my laptop, how many tries for the password?

Reverse engineering an activation code

Is it possible to send messages to other Kali Linux systems via the terminal?

Tearing up old routers

Can someone get into my computer from Omegle chat?

How to track a redditor !

Any actual hackers here because anyone wants fuck some website over?

Kali Os ***raging***

Tailscale bug allowed a person to share nodes from other tailnets without auth

ath0 (@scottlink@infosec.exchange)

VPNs to use while in China?

Hacker News: Hyundai Head Unit Hacking

What is the point of Bitlocker with only TPM ?

Blackmarket prices for passwords in early 2000's

WP 5.9.2 - prototype Pollution?

Wordpress 5.9.2 RCE?

scammed by this website

Is there a way to capture data from routers and computers without knowing a networks wifi password?

Malware source code to investigate

Comprehensive password guessing order for unthrottled online attack

Sorry, Not Sorry: Guccifer, the Hacker Who Launched Clinton Email Flap, Speaks Out After Nearly a Decade Behind Bars

XSS in hidden fields via “accesskey” attribute

Updated nim port scanner.

Smooth explanation for finding and and exploiting “SQL Injection”.

Hacker News: CircleCI says hackers stole encryption keys and customers’ source code

Tool that can decode from leet to regular characters?

Google and social media accounts hacked

Finding out who owns domain?

The most important opsec advice is always use a mem managed compiled binary like java or rust

app cracks...

Any recommendations on services or ways to aggregately keep rarely used email addresses from being deleted?

Brand Ambassador Announcement

ip / geo ban

Reverse engineering proprietary device that uses WPA

bruteforcing on a phone?

[GAME] Become a hacktivist

Ducky script/snippet to send a sequence of modifier keys?

Is there phones who call without a sim card

Any idea on if and how it would be possible to hack an old YouTube account?

Can I get in trouble

Can I get in trouble?