Posts

I wrote a shellcode encoder and wanted to share -- slidecode

Early 90s modem sequential dialer software name

Robinhood Goes Long on Bug Bounty: Q&A with Ian Carroll and @ashwarya

Hacker News: LastPass says DevOps engineer’s hacked computer led to security breach in 2022

US Marshals Service Ransomware Atttack

Hacker News: Vimium – The Hacker's Browser

Any ideas?

Is it technically possible to bypass 2FA if active on a specific account?

Nintendo Switch OS

What are the first steps to getting into cyber security/legal hacking as a career?

How Hackers Stole $1,000,000,000 (And Got Away With It)

LeapTV

Any javascript expert in here?

what clickjacking and similar attack can actually do to the visitor?

I am so tired and i have no idea what to do

Looking for a brute force script for IOS

not really a hack but it's a usefull tip

How the fuck do I report a vulnerability to a company that ignores my emails?

Just want to share this. Was fun.

How can someone can break into my accounts no matter 2fa is active and I have a strong password

How K0mraid3 stole another researcher's work (System Shell Exploit) and is refusing to give credit.

Robinhood Goes Long on Bug Bounty: Q&A with Ian Carroll and @ashwarya

The View from the Other Side: A Security Analyst's Perspective on Bug Bounty Triage

Getting around screen recording restrictions for apps (namely Tik Tok) on phone?

S1deload Stealer – Exploring the Economics of Social Network Account Hijacking (PDF)

Hacker News: Hackers are reportedly getting laid off by organized crime groups

Remotely control/automate mobile devices

How to Hide a File in an Image | Without softwares

Used Dell 7410 8FC8 Bios LOCKED am i SOL??

Level Up Your Bug Bounty Effectiveness: 3 Keys to Launch a Successful Program

Video of twitter user josephfcox using AI voice replication software to break into his own bank account that used voice biometrics for protection. Only needed some basic knowledge on target (birthday) and about 5 minutes of recorded audio to train the AI to fool the voice biometric authentication.

If modern ebook drm is 128bit encryption so how do hackers break it ?

What Does Belgium’s New Legal Framework On Hacking Mean For Me?

I've been catfished. How to find out who he was?

web application hacking courses

Robinhood Goes Long on Bug Bounty: Q&A with Ian Carroll and @ashwarya

How do Protected Management Frames affect the deauthentication stage of captive portal attacks?

A Deep Dive Into a PoshC2 Implant

Data Science with Cybersecurity project

Exploiting stomp credentials being saved on the client side

CTF - Bypass 403

Kevin Mitnick - Opinions

Isn't there a free hacking place?

Reversing arm64 executables and binaries

Bad Return status for module build

NoSQLi

Github: a Man In The Middle Proxy written in Rust

Getting ADMIN password on my computer

I lost my account so I’ll pay someone to hack it for me

Searching

Hacker News: Bing threatens to dox a student in revenge for prompt hacking

Bypassing Ipad admin

Is it still possible to bypass surveys for a file download?

NetTool - Automated Network Tool

0day in the ILOVEYOU worm?

Getting my neighbors WI-FI password

Various password reset emails

How does hashcat work?

Omegle people

Getting an old URL from the Wayback machine.

Should I intervene? If so, how?

USB Wi-Fi adapter for MT7921?

How do I get a link to a page on a webapp with an unchanging link?

The Auto-mod is a piece of shit

Hacker News: NetHack 3.6.7

Cross-Posting this here, I hope it's helpful - plus it's just a few stars away from 500 stars on Github, can we make it reach there?

Possible phishing/social engineering

is there anybody here with real life experience dealing with law enforcement?

Pro ppl pm pls

what kind of hacker are you?

pay for one on one hacking classes?

Is there a future of integrating hacking and AI?

dehashing request

Remote hacking with flipper zero

how to cut one file to two files

Overthewire Natas Level 11 updated flag

How to extract headers from get request

whats a JWT none algorithm

Have I been PWNED?

Any Youtube Channels For Absolute Beginners?

Running Duck Script or VB on a mouse (acting as a rubber ducky).

PC build advice for hacker 101

Hacker News: Show HN: I made Hacker News but for research papers

Avalanche Blockchain API Broken

Is it possible to recover everything someone sent to you on snap, even if it’s deleted?

1Password will soon skip passwords in favor of passkeys

viewing privated youtube videos trough wayback machine

Thoughts on using ChatGPT to write phishing emails for you?

How curious are you?

Hacker News: Hacking Your Keyboard with Karabiner

Is this guy trying to hack me??

Phishing website keeps saying "Deceptive site ahead"

I'll send $100 to the first person who can find a specific OnlyFans account for me

VPN/UDP port forwarding flaws?

Hacker News: The Creator of North Korean Hackers’ New Favorite Crypto Privacy Service

Why isn't this FTP exploit working?

Throwback question - What was the point of the AOL warez chat rooms that were full of punting?

Trace

Bcrypt Hash CTF

0Day DoS - Avalanche (AVAX) Blockchain

Totally new and looking for advice

Welcome to r/searchengineAI

Reddit Hacked. Hackers steal source code and internal documents.

Secure Remember Me for Login using PHP Session and Cookies

Hacking for Data Science

is there anything like the Flipper Zero but for kali linux?

GoAnywhere MFT zero-day patched

wifi spoofing

is twitter broken?

Pulling Flash Video Widgets

hack the box or tryhackme

how to recover files in a corrupted flash drive.

looking for a pro

Someone in the white-hat server asked what to do during a fire lol

Trying to find IP addresses on my network that are unused

Outsmart Cybercriminals with Proactive Attack Surface Management (ASM)

[ LONG POST ] -- I've always wondered: Even though it's usually considered a bad idea, is it it okay to re-use passwords across multiple programs IF THE PROGRAMS ARE UNIMPORTANT? In other words, you have different "tiers" of passwords that you use for programs of different levels of importance?

How to bypass restricted internet?

I Built a Self-Destructing USB Drive Part 3

Hacker AFK: Rhynorater

Where To Draw The Legal Line

What's the threshold of skill at which you could be classified as a "hacker?"

How do I copy the contents of this pull-down menu?

Am I going crazy

Did we get hacked?

So the word on the street was chatGPT so I checked it and it’s amazing. What are the hackers thinking about it??

Getting an IP without clicking any links?

Hacker News: Finland’s most-wanted hacker nabbed in France

Google dorks legality

Convert regular USB or SD/MicroSD card to a USB Rubber Ducky.

i want to make a rubber ducky

How do I add a PHP script to a python exploit?