Posts

reverse vending machines

Mac address spoofing

Getting email addresses

what's the best live hunting vid you came across?

Truth

Devs are truly athletes!

Openning cmd using sticky keys shortcut

oss-security - backdoor in upstream xz/liblzma leading to ssh server compromise

I bought a used computer from a now deceased relative and cannot download anything because my account is not the "administrator" account

Hacker target suggestions - cracking echo chambers

The cmd block bypasser: a demonstration on resourcefulness

Will I get caught using Androdumpper

Servers hacked in ongoing attack targeting Ray AI framework

is there any way to access privated youtube videos?

Restore old Data

What kinds of phones do you guys use as a hacker?

Can’t access my hotmail..

5" nft/digital photo frame hacking

Made this fully automated vulnerability scanning project that uses multiple AI Agents that work together as a proof of concept only

Russian Military Used Hacked Cameras in Missile Strike on Capital, Alleges Ukraine

Chinese hackers targeted Electoral Commission and politicians, say…

What Are Bug Bounties and How Do They Work?

Longer-range RFID transmitting?

Keybase app cracked by police

Not sure what to make of this.

Seeking guidance

Struggling to find anything

Hackers earn $1,132,500 for 29 zero-days at Pwn2Own Vancouver

If a program is "open source" how do people confirm it?

Should I learn C/C++ or assembly?

Can I "Hack" A nike fuelband?

any free tool to unlock android/ huawei lock screen code ?

Why would someone hack you?

What's your hunting methodology , what tools do you use?

Who knows how to hack CarPlay?

AI Safety vs. AI Security

Hacking a guitar pedal?

Fuckface

Remote Phone Access

So what is the most common and accessible way for hackers to stay hidden?

Russian Socks5 Proxies

Apex Hack

Linux payloads using msfvenom

Can anyone spoof a fax from one number to another number?

“Good news: we are not dying, we are going live FOREVER!”

How often do insurance companies get hacked? (US)

MUDding Around: Hacking for gold in text-based games

A must use list of online tools for bounty hunters

What happens if I send a https request to a remote server, but I modify the source address to 127.0.0.1 to make it execute stuff on itself because it might think it's from localhost and therefore grant admin access? Does this work? Is it a rare vulnerability?

Modifying older APK file to bypass updating

Seeking Help: Reverse Engineering Decryptor for SECLES Ransomeware

BC Security will be offering a free offensive IronPython webinar

What does the hacking community have to say about Byte Dance, if they're dangerous, how are they dangerous?

Infrared blaster/ remote for android

Tunneling through http server

Hacking a USB-C wall wart turning it into a wireless bench top power supply! :)

What is allowed once you access information meant to be private but actually publicly accesible?

BS arcade machine

Why hashcat isn't working (MD5 word press) ?

Pay someone

windows defender insta kills my sfx files

Shift Left is Dead: A Post Mortem

Discovering Deserialization Gadget Chains in Rubyland

How are accounts dump cracked?

NCSC Recognises The Work Of Ethical Hackers With An Appreciation Event

Does BitLocker protect against file replacement attacks?

GitHub - Website Prompt Injection Concept/Examples

Okta says data leaked on hacking forum not from its systems

Thanks Poe 🙂

Android Userland Fuzzing and Exploitation

does anyone here miss GreySec?

Book recommendations for cellular technology

New open source security testing tool with interactive web app to execute techniques

How to make a bot that votes on polls?

Envato templates

How do I get into my moms old phone

How to use IPv4 to BYPASS ANY ANTIVIRUS SIGNATURE BASED DETECTION

Does anyone know a easy to use , free windows password cracker?

What interested you in hacking?

The White House Should Prioritize Cybersecurity in its Budget

Can hashcat benefit from having multiple hashes of the same password?

Decrypt a DLL file

Hacked switch. Plans soon to install switchdroid

Need some help and guidance

Can someone try and recover this video link???

Hacked WordPress sites use visitors' browsers to hack other sites

Cloning an RFID badge to RFID ring

Overcoming Layout Sensitivity in BadUSB: Seeking Community Wisdom

Wifite no targets? Worked yesterday

BlackCat ransomware shuts down in exit scam, blames the "feds"

A troll is sending waves of bots into my social media accounts to get them suspended. Is this technically a crime due to misuse of a computer, his intent is to cause distress, annoyance and alarm.

Mysterious pop-up followed by system alert boop while browsing nsfw. Logs do not reveal the cause of the alert.

Am i victim of MITM attack?

GTA VC on a TP link router running Debian (credits: Manawyrm, source in description

What tool/gadget has the IR and NFC capabilities of a Flipper ZERO?

What are some „news sources“ about hacking

Cracking a school wifi password

I have a hard time completing the game of 4 Elements by Playrix. I’m looking for someone who can hack the game just for removing the timer.

Old Snap account

How yo avoid being doxxed?

Next steps once you’re in a system?

I've read some great books on mathematicians that showed how they solved problems. Are there any books/videos on hackers working through a problem?

SSH Access to VM

Spotify lifetime premium generator

I made the new biggest zip bomb to my knowledge.

How to Phish someone's number from their email?