Posts

Think either Accenture or Workday have had a breach

Where can I get into theory?

Best place to sell it?

LLMs might actually destroy the internet making it not just uninteresting but actually completely unusable.

History of cyber warfare

The landing pages of Ransomware groups

I'm writing a screenplay where a cyber security expert is contacted to apply for a position on a website by a rogue company. The website itself is a test that the character has to "hack" to apply. I'd like it to be something that the expert considers clever. Any fun suggestions?

Any Password Databases like Intelx

Permission denied when trying to run malicious .exe file?

Email hack

Resources for Aerospace Hacking

Device that picks up security cameras or hidden cameras?

Are vulnerability Proof of Concepts bad?

Anyone heard about Anonymous Sudan and their claimed reasons behind the recent Microsoft attack?

Suspicious event log on my pc

Session Hijacking MS 365 account on Mac via only malicious website?

Krbtgt abuse

How do I report a serious bug bounty to poshmark

Do you thing Macbook Air is a good choice for hacking?

Major Security flaw in almost every store in my country how can this even happen?

Got a text. Anyone got a VM running they can explore and let us know what happens?

tcp mitm attack on android

is university good for learning IT and more specifically cyber security?

Hackerone for bug bounties

So I tried sending a zip bomb to a pedophile and it didn't work.

Android app research

I almost hacked my university

What is your favorite wifi hacking tool?

Someone spoofing my company's number and texted me non-malicious links. Why?

how to create email alias at @bugcrowdninja?

Impact ratings-Metasploitable 2

Tiktok hacking

Is it possible to hack something(Like a game) with a programming language different than its written in?

Burpsuite Error

4G Unlimited Data on YouTube but throttled ... Any solution ?

How do hackers hide their ip in reverse shells?

Tracking a TextNow Number

Service neeeded dm me

is my apple id hacked? this device is listed under my devices on my apple id. i tried to remove it on my computer but it didnt budge. this is not mine nor have i ever owned one.

hey im trying to destroy a chromebook with a zip bomb to try to intall .apks files

JQF Genetic Algorithm

Rat apps that can hide itself?

Hi idiot here

Windows SAM file

Uncoordinated Spotify session?

SMS Phishers Harvested Phone Numbers Shipment Data from UPS Tracking Tool

certifications for first job at pt

Is it possible to play my IP TV on an aeroplanes tv?

Sql

It is SUCH a good feeling when something finally clicks.

How to flood phone numbers ?

So I'm taking Cyber Security Awareness training...

Android Malware on the Rise A case study of AhMyth RAT

My university got hacked

What should I be learning next?

I hate to come to this subreddit but okay

Wordlist generation .mask ?

iPad Pro 2nd gen

Have you read FreakyClowns book about how hes robbed thousands of banks legally

My journey to being a SWE

Super nostalgic: When I was probably 10 I installed a pirated Vista OS on one of my moms machines and it happened to be this particular cracked install with a religious easter egg on the boot screen. Anyone else seen this or remember this?

Seeking For OSINT Tools

Untrackable?

Alright this is a long shot and dont even know if this is the right community. Does anyone know how i would bypass or brute force the password on my old ancient laptop. just kinda curious whats on it

India threatened to shut down Twitter and raid employees' homes Jack Dorsey says

Cheap laptop for cyber security & hacking

Microsoft confirms hacking of Outlook OneDrive in June | Fortune

ZSecurity is not replying to me

Google claims it caught China government hackers redhanded breaking into hundreds of networks around the world

Busted screen

Converting XCP files to a FILE. I can't figure this out.

how to fully factory reset an phone a phone without a password

Hacker ...

Anybody knows tools to embed arbitrary data into videos?

Is there a way to brute force wifi passwords from a known list

Hacking?

Cracking RAR file password?

Do you guys watch any YouTubers or any type of creater who review random scripts like ddos scripts etc?

ExploitToolFinder

Really cool newish game for anyone wanting to get into the craft | World of Haiku

The US Navy NATO and NASA are using a shady Chinese companys encryption chips

Best black vps?

Friends only wall - anything I can do?

I have created a tool MobSecco. which allow clone and create replica apk for bypassing code tampering detection and check CVE from plugins in Cordova Framework mobile application.

How to crack PC games?

Meterpreter Reverse Shell Exploit Clarification

Hackers can steal cryptographic keys by video-recording power LEDs 60 feet away

Hack The SAT?

Grammarly CISO Suha Can Discusses the Impact of Preemptive Security with HackerOne

I think Im stuck

Grant highest perms to virus

ctf on a resume

web app scanning

Brute-force attack password generator model?

Hello fsocity.dic

[LIVE UPDATE] Clop Leaks: First Wave of Victims Named

Tracing Fake Phone Number

Cadet Blizzard emerges as a novel and distinct Russian threat actor

How would you stop someone finding you?

how dangerous is browsing through dark/deep web? is it illegal?