Posts

Throwback (2013) AntiSec/LulzSec joined a conference call in between the FBI and Met Police/Scotland Yard and recorded it

I'll just replace it with my Raspberry PI

How much would it take for somebody to DDoS Cloudlflare?

on MacOS, if you download malware to 1 user, will the other users on the computer be affected?

Powershell script obfuscator

Fla. Man Charged in SIM-Swapping Spree is Key Suspect in Hacker Groups Oktapus, Scattered Spider

Key-genning with KeyAuth

Hashcat for only three digits left - too short?

Wi-Fi password

Studying networking

Pwd managers

Is it possible to decompile a Unity apk file? (Security concern)

Crosspost - Sniffing 2.4GHz rf traffic for rf sync 3d shutter glasses

Stately Taurus Targets Myanmar Amidst Concerns over Military Junta’s Handling of Rebel Attacks

How did my dad get scammed?

Token challenge. Random, encoded or encrypted?

CMD Terminal popping up randomly and disappearing right away

so uh - i met torswats like hours before he was raided

Is it possible to show up as a local device when connected remotely?

Ethical AI

How is that possible, considering every messaging app nowadays uses an encrypted connection?

Anyone still using BeeLogger in 2024?

Anyone know how to fix this?

Black box a risk?

AI-Exploits: Triton Inference Server RCE Released

How to figure out email address of a youtube account?

ShmooCon and CES

Checking SSH connections against Terrapin attack

Does every reverse shell get flagged by av?

Could you make use of devices in an Apocalyptic world?

For the more experienced people in the sub, when did you ‘git gud’ at hacking? Was there a particular moment where you felt like you had improved a lot as an attacker?

Would you like a generic parser and data extractor for the outputs of hacking tools?

Pancakescon 5- Full Stack Hack! Needs Volunteers!

Red Teamers/Pentesters: Strategies for File Transfer in Isolated Environments?

Are Denial of Service (DoS) vulnerabilities discovered just failed Remote Code Execution (RCE) discoveries?

How to write a cyber attack in a story

Any way to download flipper zero OS on a raspberry Pi?

How a Cross-Site Scripting Vulnerability Led to Account Takeover

What to do next?

Looking at you Microsoft

Is there a way to bypass this on a M1 macbook?

Be ME

Microsoft Actions Following Attack by Nation State Actor Midnight Blizzard

Any ethical hackers have any ideas?

The Semicolon Apocalypse?

Found an exploit in my schools gate authentication

Flipper zero

German developer guilty of 'hacking' for exposing hardcoded credentials in app

Pretty legit hacking history auction

Detecting if someone is nearby

Upvotes on disqus

How do you show CTFs?

Is it possible to retrieve deleted insta DMs ?

Where do I start

ALFA AWUS1900 very if its original or fake?

ZipRipper - a CMD wrapper for JohnTheRipper

Website cataglory

Anyone know cerebral assassin?

Popual telegram channels you are in

UK Law On Vulnerability Disclosure

Tool: SploitScan

Can someone run John the Ripper for me?

Is a telegram username enough to go to the police?

Can I communicate with my hacker?

Living off the land (LOTL) persistent reverse shell for windows

Targeted Ads

One Line Chrome Extension

There's no hobby programmers anymore

Remember a messaging app that got popular because police requested something from them?

Is FXP still a thing?

Here is an IDA Getting started video for Embedded ARM Firmware

Can i get my IP stolen or something like that just from clicking a link?

HackerOne Partners With Semgrep to Combine Expert Code Review With Powerful Automation

This is a weird one

Deadly Cartel Hired Hackers to Stop Anonymous | #OpCartel

Unlockt.me Bypass

Is it possible to get a wifi password off of a managed iPad?

Call for Speakers for the 2024 Carolina Code Conference is open until April 15th

Where to upload your vuln vms now that vulnhub is gone?

New Zealand Reverses World-First Smoking ‘Generation Ban’ for Tax Cuts

A Plea to Enlist Help to Save My Family from Generational Tragedy

Strict Chain in proxychains is not working

RaidForum alternatives for data breaches?

Two factor authentication

Signal not secure due to google and apple control of notifications

Anybody know of custom firmware for outdoor security cameras like this, or a way to specifically enable WIFI instead of just cellular data?

Why would companies like Kaspersky disclose Operation Triangulation instead of selling it to the Russian government (FSB)

Carefull yall

Why isn't it possible for a bad actor to immitate a Wi-Fi point and get the password the user enters?

Stuxnet: Variant B (encrypted & packed), Colorized, 2024 [Follow-up]

Hacking challenge with reward

Is my WhatsApp hacked? Mine and my friend WhatsApp icons look different.

WAP2 cracking using reaver not working

Can I hack frontline education to have more absences due to cancer treatment?

How secure is bcrypt?

find someone’s IP address from their YouTube channel (if they’ve left a comment)?

Kali pi tail guide

Why is windows login insecure what am I missing?

2024 Roadmap to Master Hacker

False positives for hydra.

0day Bitcoin Exploit - Remote OOM P2P Crash

How would you own an entire network?