Posts

Accessing File Name in Software

What's stopping us?

Database Breach Search Engine | CheckLeaked.cc

looking to learn binary exploitation, but don’t know a lot of terms

Everest Ransomware group posts advert to hire corporate insiders

Defi Kannagi Finance on zkSync Era Rugged for -$2.13M

Pool on the roof - July 31, 2023

Windows RDP Session Hijacking

how do i choose kali linux for my virtual machine? its not on the list

Hacker's daily job interview

Overwriting a DLL

made my first cyber sec project in python, its an port scanner. nothing fancy i guess but a good start, maybe?

DarkWidow - a Dropper/PostExploitation Tool (or can be used in both situations) targeting Windows

The U.K. Government Is Close to Eroding Encryption Worldwide

We can spoof processes, rename malware to svchost, but what about faking file location?

LK-99: The Room-Temperature Superconductor Revolution - What’s Your Take?”

Good books to get into hacking

Hacker's daily job interview

What hacking demo related to passwd cracking should I do at my presentation?

I want a person removing insta account

Parrot OS encryption SSD drive

enable hdmi panasonic siera TV in hotel

IP anonymity.

Found a vulnerability on a mobile app but can’t utilise it on a mobile phone, any ideas?

Trolls

Hacking tik tok private account?

Resort IT computer

Zoom and Salesforce: The Role of Hackers in Addressing Security Challenges

Lazarus hackers linked to $60 million Alphapo cryptocurrency heist

Music keyboard/synthesizer hacking?

ADCSKiller - a Python-based tool designed to automate the process of discovering and exploiting Active Directory Certificate Services (ADCS) vulnerabilities. It leverages features of Certipy and Coercer to simplify the process of attacking ADCS infrastructure.

How do I see if hacking is for me?

Bluetooth Hacking Test Devices

Spoof Emails

An anyone get this video without having to pay?

Code Kept Secret for Years Reveals Its Flaw—a Backdoor

Online Certificate Status Protocol

Mirai botnet usable without Kali Ubuntu/Debian

Does anyone know how to embed js scripts on other peoples websites

Will Twitter (ehm...X) still be the cybersec favorite social media?

Bittorrent search engine vulnerabilities?

Possible to swap internals on BT keyboard?

JumpCloud hack linked to North Korea after OPSEC mistake

What happened to amass viz?

How to unlock old ipad 2 without losing data of videos or photos

SMS-Sender: A Python program designed to send SMS messages to numbers through websites.

Alphv/BlackCat just added an API

Can I remove everything created by a new user in windows?

Finding a way to skip long telephone ques

Mobile ops.

Are there any climate hacktivist groups?

ISO: Resources

Is It Too Late to Learn Computer and Cyber Security in My Mid 30s?

Celebrity Monsters

Cracking a wifi password

Mission Impossible

What should be my next step?

Bad usb will it work like rubber ducky?

Send in Blue (currently known as Brevo) isn't working for me. My friend and I are using it to send phishing emails to each other. Send in blue ensures that an email goes to a person's main inbox and not spam. Are there any alternatives that work?

401 status code while bruteforcing?

Can normal files be spoofed into malware?

Tip for Recon

TP Link Archer T2U Plus Connection Problem Virtual Box

Does nikto only give false positives?

Tim Burke and lawyers deny hacking Fox News, demand return of devices

System compromised like crazy, if I restore using the windows 11 settings factory reset can the malware still be persistent? Like could an actor have compromized the reset process within the os vai registry alterations? should I make installation media via a clean pc and restore that way to be sure?

Looking for a team!

Why wont the west tolerate people hacking russian banks

Breachforums.vc is down?

anyone know how i can clone this gate key to a universal clicker?

study partner and teacher

Lost motivation

https://ift.tt/jZxS5Rs

BackDoor in PHP

https://ift.tt/BtnrWml announces on their site that you can steal the site so here is their cpanel. Have fun hackers. This one is above board. https://ift.tt/lHEAcfx

How to Find Advanced Persistent Threats in your Security Logs

Fake AP/ Rogue AP

Is there anyway to change the locked apps in power saving mode on a galaxy s23 ultra? Also posted this in the galaxy s23 ultra sub.

Burp intruder probleme

DJI Drone Digital Forensics Suite made using Golang 🗺🔍✨

How to disclose an exploit without causing harm?

anyone knows if this cert is a good option? (C3SA)

Any love for the show Rabbit hole?

Any way to inject javascript codes when im MITM to any website victim visit WITHOUT downgrade HTTPS?

CISA drops some free tools to secure data in cloud services

Security Should Never Sleep: Adopting Continuous Testing for Evolving Threats

State of this subreddit right now

CTF Chagllenge

Getting Started with Mythic C2

Is it possible to gain root access to an Arlo camera?

Is there a way to check if a device you buy is secure?

How to manually scan networks?

how do I hide a reverse shell

Which would you go with?

Hacking Nike+ Fuelband

Looking to hire a credible hacker

what got you interested in hacking?

Frustrated

What are your favorite hacking forums?

Books for cybersecurity research

Responsible disclosure in a game

Posts about script kiddies bring more script kiddies in my DMs it seems

Wpa craking

Does DUN=0 still work for preventing hotspot use detection in Android devices?

I'm having legal problems caused by corrupt law enforcement and politicians in Uvalde Texas. I'm serious, and can verify. Can someone hook me up with a lawyer or media outlets, even youtube channels? Unfortunately, this is real.

Hackcat accessories

Someone sent a threatening e-mail from my own account. Should I be worried?

Multi Tools