Posts

What Happened to Online Gaming?

Work Computer Monitoring: What Does It Really Mean in Detail?

How a GraphQL Bug Resulted in Authentication Bypass

Windows recovery and bootable usb maker in 200kb

Deauth Detector (and Network Visualizer)

Change Healthcare begins the process of notifying victims of February hack

Kuband GSE traffic that does not work with GSExtract

Is this legit?

Record HTML requests in DevTools?

The Wild West of Proof of Concept Exploit Code (PoC)

How do I hack a Hatch Rest (2nd gen) to play any sound?

$23m reward 😯

Is there a possibility of finding an account on IG through a recently created filter? even if you don't have its full name?

Any cybersecurity project idea under $11?

Update: the correct photo was replaced by a glitch from reddit

Having Trouble Hex-Editing in Animal Crossing: Wild World

How do i use the mcu to connect to my pc and add doom to its system files

Issues playing a computer game from the 2000s (Ballistik by Oberon media)

A North Korean Hacker Tricked a US Security Vendor Into Hiring Him—and Immediately Tried to Hack Them — WIRED

Is this possible?

Lessons from HackerOne’s First Recharge Week

Now how to uninstall hydra?

Well it's officially a honey pot

Is this SVG malicious?

Hack My Career: Meet Naz Bozdemir

LLM03: Data Training Poisoning

Crazy ask

Meta tops the list as the most imitated brand in phishing attacks

Hackers Leak Documents from Pentagon IT Services Provider

HUR Hackers Shut Down Russian Banks and Internet Providers

How do cracked premium apps (like Spotify) really work? Where can I learn cracking such premiums?

New macOS stealer found on VirusTotal: Similarities to JaskaGO

Best RAT available rn ?

Android Payload in 2024?

Hacking Starbucks Register (to play doom at work)

Outlook email issues

How To Stay Anonymous & Secure Online

Where to download malware to study?

it be like that sometimes

Old note 3 (rooted but only wifi. no gsm) what should I do with it??

Was Crowdstrike bug a hack to take advantage of bug?

CrowdStrike is the cyberfirm that generated the claim that Russia hacked the DNC, setting off Russiagate. Even though CrowdStrike was working for the Clinton campaign, the FBI relied on it rather than independently investigate the "hacked" DNC servers

Safe source of malware to attack your own devices?

Doxx

The community notes just made it more funnier

Spoofing futo's buy server

Random thought

I want to see my local Lidl camera feedd

SeigeSec group story

What HackerOne Customers Say About the Problems Hackers Solve

Respotter - a honeypot for Responder

Do you know any case of a race condition vulnerability that was exploited in a hack against a big company/startup

RFID Mifare Classic Cloning

Does anyone know if this bundle is worth buying for a basically beginner? Or do they suck

[DEF CON 32] Presenting our Open Hardware Dead Man Switch

Tik tok account got possessed by Vietnamese guy

Can I get into cybersecurity with dropped charges?

What HackerOne Customers Say About the Problems Hackers Solve

Ripping Audio From Streaming Services Like Spotify

I'm switching to a dumb phone, is there any way to program message forwarding from WhatsApp web to an SMS number?

I don't know if anyone is interested in this, but I found this weird cracking puzzle made for a music artist called Master Boot Record

I dont understand certificates. I have an app with a cert that expired 10 years ago but it shows good?

What is man-on-the-side attack and why they are not so common?

Could this have contained malware?

What are the best approaches to running python scripts on Windows devices that have no Python interpreter?

What options does a hacker have when they have the password of your router?

I'm scared about how someone did this and I wanna know how to prevent it.

announcing new Serial Experiments: Lain themed cybersecurity / CTF / ethical hacking YouTube channel in the works ^_^

AMA this upcoming Monday with Mikael Thalen of the Daily Dot regarding SiegedSec and their breach of the Heritage Foundation

link to Gay Furry Hackers leaked docs?

Run Book Templates

Pentesting for Web Applications

My own mental predicament

Give it the ol "Noctua!"

Changing location on tinder

SiegedSec convo logs with Mike Howell from the Heritage Foundation

Inside the World of Scammers & Check Fraud

What do security researchers do ?

OWASP in Chrome Browser

What HackerOne Customers Say About Remediating Vulnerabilities and Getting the Best Results From Hackers

1.4 GB NSA Data Leaked Online – Email Address, Phone Number & Gov Classified Data Exposed

Breaking words into de search bar and .gov and .gob files showed 😱

Find youtube mail adress.

“GameBoy”-like Car Key Brute Forcer

Whet to download rockyou2024?

Finding an MitM actor?

BJORN - Added the README on Github - Alpha release soon

How does 'DDOS protection' work?

Hi guys. Can i install a vm on my dell inspiron laptop intel core i5?

SiegedSec has something cooking

What is your most absurd method to pop a box that shouldn't have worked but it did

SHA-256 and 8-bit video games question

Replied to Spam Email By Mistake

how do i brute force the password to my own drive (view my other posts)

Wi-Fi Deauth

Methods other than sticky keys exploit to get past windows password?

Anyone up for some ethical hacking?

Found a Security Exploit in Popular Software – Seeking Advice on Anonymous Reporting and Potential Rewards

Unknown IPs joined my RAT?