Posts

Is there a way to get emails from an email address that doesn’t exist sent to an email address that does exist?

qihoo 360 s6 custom voice pack

what can be done with city, ip, provider, isp, and ip

Brain hack

How to change / do things to apps on a android (and iPhone) via laptop

Shein new user hack

Am I fucked? PowerShell scripts running at boot

It better to start as software developer then move to hacking?

any good sites for reading about pentests?

NASA hacked a computer that was 22.5 light hours away from earth

Pride Month: Stories from Our LGBTQ+ Employees

Free to use Socks5?

Curpsuite not opening in kali. Stuck on Splash screen

Polyfill supply chain attack hits 100K+ sites

Phone hacking?

Planet Fitness payment system.

Auth. Bypass In (Un)Limited Scenarios - Progress MOVEit Transfer (CVE-2024-5806)

Have I been phished with /s/ in reddit link?

Community-driven PTaaS vs. Traditional Pentesting

Have anyone tried this before?

Hi hackers

First AD hack options

Microwave Hacking

How do you find someones location with phone number?

IP Cam hacking?

Apartment uses fobs for lock

I keep failing a PC check and I don't know why.

Is it possible?

Having access to SSL cert private key

Community-driven PTaaS vs. Traditional Pentesting

Set up proxy, can connect to proxy through Python, but not through my Mac

Access phone files through windows pc?

Using a VPN for Telehealth While Abroad?

Voices coming from PC

Assistance with analyzing stack-based buffer overflow

How do I find a hacker?

Got this email. Is this real?

Is there any reason someone would be continuously trying to login to an account of mine for months straight?

AD / Windows question

So what could I do with this?

Would you say there’s such a thing as top 1% hackers?

Challenge: finding a users alt account

ChatGPT guessed correctly

What would happen if I connected a router to the ethernet cable of my apartment's building without contacting ISP?

I learned how to disable access to one or more accounts on a Windows Remote machine

Samsung Galaxy Tab Pro 12.2 as a drawing tablet?

US Is Unprepared for Attacks on Critical Infrastructure: RAND Simulation

why did London hospitals get attacked ?

A list of some hacking resources, mostly Windows oriented

Is it possible to have card info stolen from a physical card payment?

Which language is this ? and what does it say? [ its most probably code cuz google/microsoft translate doesnt identify it] i found it in a log file of a well known/used app

Is this a scam?

OffSec KAI (Your Personal Student Mentor)

Hashcat - which parameters to use?

The UK and Canada Probe into the 23AndMe Data Breach

exploit-db/searchsploit with updated scripts for python3?

Any way to unlock a thermostat without the password?

Hack My Career: Advice from HackerOne Employees

Hackers steal “significant volume” of data from hundreds of Snowflake customers

NYTimes Source Code Leaked After GitHub Breach

A hacking landlord - ID Theft Issue

College student struggling with cybersecurity assignment

Where to download dumps from data leaks?

OWASP Top 10 LLM Vulnerabilities & Security Checklist

Wish Project2025.org would be hacked

Hacking windows recall with a python script

Does anyone know how to fix this redirecting yahoo thing I accidentally downloaded?

Did I click on phishing link? (I saw this when I clicked)

This sub used to be more security focused but has gone down hill. Are there subs that are closer to what this used to be

I found a big mistake on Amazon. Where should I report this?

Kali Rpi5

BurpSuite & FoxyProxy

I'm looking to add Mac OSX TTPs to this Red Teaming Repo! Have any good ones?

From Zero to Hero: Your Guide to Building a Bug Bounty Program With HackerOne

hacking CCTV

Chinese hacking groups team up in cyber espionage campaign

Where do hackers get web servers to host their phishing websites ?

Cracking a software many moons ago - 1997 nostalgia

The Origins of Hacker Culture

Decyphering obfuscated, JavaScript malware

If you had to buy a laptop to dedicate to hacking, which one would it be?

HackerOne Spot Checks for On-Demand, Targeted Security Testing

all arms but no brain

Can i get hacked from joining public Wi-fi?

Cariboulite 6GHz rpi hat

Hackers target Check Point VPNs to breach enterprise networks

Exposing Senders IP

Lackluster wifi security

John The Ripper ?

How to remote start Milwaukee M18 pump?