Posts

Responsible AI at HackerOne

Divide and conquer debugging

Responsible AI at HackerOne

Which database breach is this?

Hardcore SSTI in Jinja2

How to break a contactless point of sale device

Shadows of the Net: The Dark Web, Hacking, and AI's Double-Edged Sword

I enjoy making exploit for windows and fun virus, where is to share them?

Keep getting all of my ads immediately flagged.

Group chat, free guides & methods

What is going on here?

Binary Frontiers: The Convergence of Hacking and AI

Company has a few security issues

Raspberry Pi as a Wifi Router

Monitoring a Page for a GET Request

Hashcat set character limit

Finding You: The Network Effect of Telecommunications Vulnerabilities for Location Disclosure

Can anyone tell me how to reverse lookup a number that just sent me a rather creepy text?

Smart heaters are using binary format to communicate over MQTT. What techniques can I use to figure out the format?

Hackers can force iOS and macOS browsers to divulge passwords and much more

Responsible AI at HackerOne

OMG-Duino / A budget and open implementation of HAK-5`s OMG-Plug built with the Arduino pro micro and the ESP8266

Quasar

At what point in learning pentesting would be the best time to learn coding?

What's the play here? 20 emails like this in about 15 hours.

Deploy C2 Redirectors at Scale with WolfPack

A Deep Dive into Cactus Ransomware

How is this vulnerable?

Pool on the roof - October 23, 2023

IPad mini blocked

Little humor for the weekend, Mostly won't get it.

How safe is it to use winrar's password function to protect sensitive files

What's an Asterisk for in coding?

Android os iso

can anything malicious be done through Omegle?

Phone number

Is there a way to find out the Open source bill of material for a certain program?

Kicking Off the Final Round of the 2023 Ambassador World Cup

Is it possible to do IDN Homograph Attack without the victim's browser showing weird text?

Disclosures on BitBucket repos -- CVE?

MagCard MSR software keeps showing this anytime I try to write a card. Every rare moment it will write it.

Leviton Bluetooth Bluetooth project /research

Proud of SOC

Site I'm working on for client got hacked. PHP code injected into index.php, anyone know what it does?

How to debug USB CRW (Card Reader)

Why the answer is only A and not both A and B? Why B is wrong?Can't zombies run the attack being synced with a certain datetime instead of being controlled by a master? Isn't this also a botnet?

I made a pcap to hc2200 converter

click the cia's telegram link on x

John The Ripper worldlist error

The fnaf movie in italian

Anonymously browse other WiFi router

Automate your recon with QtRecon

Can a hacker read an email on gmail sent at that moment when the pc is turned off?

Compiling addresses for my target

Bypass paywall on airline wifi

How to safely send a zip bom

How to protect my website from malicious users

My high-school cybersecurity class received all these zSpace glasses, what should we do with them?

I want to get access of CCTV

how to make a keylogger for my computer?

How to go about finding unindexed urls on someone's personal website?

Mom of a 12yo proto script kiddie

Advice for hacking Legacy Gamemaker Program?

Ransomed posts "Fuck Palestine" and that they will buy access to Gaza and Iranian companies/systems

Beginner's Guide to Home and Office Network Vulnerabilities

Just for fun- what's your favourite hack from Mr. Robot?

This acount only follows me and viewed my story should I be concerned

Can I jailbreak and use my friends old work phone?

Is this site a certain CMS system or custom-built?

What subjects should I learn?

How to crack NTLM hashes?

Ssh

Wifi router is denying a computer access because it's Windows 7. Possible to spoof Win10

Trying to execute shellcode via DLL

Security Tips & Devices for Digital Nomads

Hashcat with locked iPad-- cannot locate hash file

Get esim number?

How to FALL IN LOVE with Networking?

how to edit online excel sheet without edit access

AnonGhost exploits API vulnerability in the RedAlert app to dispatch fake messages

Employer scammed me, how to spam their call center?

Does re installing a new operating system rid you of any keyloggers/RAT programs?

Has anyone here played any of the Zachtronics games?

Detecting Keyloggers

who is lookup shows limited info.

Doxing in the 2000's

Having trouble installing nethunter please not sure why the commands are not working?

Service enumeration giving false positive. A good thing?

AI-powered Cyberattacks

۶ attacking tumblr in 2011 ۶

should i be worried?

Thousands of Android devices come with unkillable backdoor preinstalled

Leak them

How Target Was Breached in 2013

Does using a VPN prevent your devices from showing up on Shodan?

Is there an app that cracks wpa2 passwords easily

The source code of the HelloKitty ransomware has been leaked on the XSS forum by kapuchin0 (Gookee).

How is this possible in 2023, on a GOV domain???

Phishing 2FA 25 years ago

GitHub - Cod3zghost/RAT-Python3: Remote Administration Tool written in python3

GitHub - Cod3zghost/SSH-RCE: User authenticated SSH Remote Code Execution

Which portion of this, is the actual Windows password hash?

Wireshark monitoring

802.11r handshake capture

How to secure a server?

Anything I can do with an old Dish Joey?

How and why does this privilege escalation using less works exacly?

A collection of several hundred online tools for OSINT