Posts

Spoofed iMessages

Trying to find hidden URL destinations on a domain

Bluetooth security flaws reveals all devices launched after 2014 can be hacked

Accessing directory from IP address

how to reset tablet

Zeroed-In Technologies, LLC Data Breach - Class Action Investigation: Did you receive a letter from Zeroed-In Technologies, LLC?

Error message launching Ubuntu VM in Windows 11

How to transfer files using ssh on a locked down computer?

Bypass Samsung FRP Galaxy Tab SM-T580

Israeli hacked a drone that belongs to a Gazan reporter in less than a minute, how?

Inaugural Glass Firewall Conference Invites Women to Learn About Cybersecurity

Hacking 2023 eBooks Bundle by No Starch Press

Phishy - A Tool To Teach About Phishing

DNS Cache Poisoning question

What's up with these unsophisticated botnets?...

How VDP Aligns With Zero Trust

The dangers of wormgpt

can pegusus hack online forums?

Being ransomed

Windows Defender defeated by the -O3 gcc optimization flag

I created a tool that gives interesting insights on CTFd competitions - CTFd Rewind

A cyber infra-setup nightmare 0-day article

How VDP Aligns With Zero Trust

Is there any hope in getting this video

How VDP Aligns With Zero Trust

Is it true beginner hackers practice on government websites

CTF Writeup Competition with Giveaway

What software or program/Command prompt can I use to identify the people with access to view my laptop and mobile device?

Realtime Training resorces

CISA, FBI, MS-ISAC, and ASD’s ACSC Release Advisory on LockBit Affiliates Exploiting Citrix Bleed

Is there a way?

Disguising malware as a image

possible XSS... ?

Accidentally miss clicked a click fraud link

How to crack NTLM hashes in Arabic

Shodan and vpn

Revenge hack

Does sslstrip still work?

The MOVEit Hack In Retrospect

Wifi Adapters doubt

Small job offer

High-powered antennas

Simple ransomware written in golang

anyone able to view this file

Meet the Talent Strategy Team

Using dirent in a regular binary

Evil twin attacks

Golden Ticket Attack confusion (Kerberos)

hashcat clBuildProgram(): CL_BUILD_PROGRAM_FAILURE error: unknown target CPU 'generic'

Vulnerability Prioritization: Severity Does Not Mean Priority

Punching hardware ID to unlock software.

Are there any good/interesting videos out there about the process of hacking Cable TV in the 80s/90s?

How to get hash from encrypted .vbox file?

An entire state's population just had its data stolen by a ransomware group

How do I stop this

Obd 2 port hacking, how to hack around with cars?

Immergas fan coil controller

Maine says 1.3M people affected by data breach

Same threats, different ransomware

A Tale of 2 Vulnerability Disclosures

Is it okay to use walkthrough's as a beginner?

How to make and sell YouTube views?

PROMPT# Issue: Infosec Survival Guide - Second Volume - Black Hills Information Security

Get access to network with just Ethernet port?

a detective came by saying they were looking for someone from our home

How does one start?

New to the scene

Girl in the Spider’s Web

Secure SSH to home computer.

Does anyone send smime emails so that they look cool. Just for the fun of it not really caring about the security features. https://ift.tt/hXDcaYz

Simulate a finger/mouse on a Samsung cell phone

Attack Surface Management Requirements

Can anyone lmk how to dump browsers password or cookies??!

Hackers exploit Looney Tunables Linux bug, steal cloud creds

Copying my studio key fob

Can your device can be hacked if you visited Pornhub or any porn sites

Cases where DAI ( Dynamic ARP insepection ) has failed and caused a major disturption? by Cyber crime history?

Just finished Hacking / Reverse Engineering this Smart prayer reminder ring (ZIKR Ring) which has BLE and an OLED Display in the size of a ring

Extracting Password From Windows Server SAM file.

Free guides & methods

*_🗿_*

Is hacker culture dead now?

Requesting style advice for "hacker"-themed game rules text

Can anyone explain what this means?

Is there a cheaper version of Flipper Zero?

What is hRDP and why its probably one of the worst malware you could have. (Simple)

Can’t capture SIP Register packets with Wireshark

Exfil using Serial Port

SSL/TLS Decryption

What is the most capable and simplest RFID cloning device?

Script to upload files to DVWA

I wrote a Hacker News Bot that upvotes and comments using ChatGPT. What do you want to know about it?

Disable Rowenta compact steam iron’s auto shutoff feature?

Any apps like "Virtual Camera (VCamera)" on Playstore?

Decrypting the network traffic of an android game built with Unity