Posts

The 'AES256 Encryption Attack' Redaction Riddle

Systems used by courts and governments across the US riddled with vulnerabilities

How secure are websites generally?

What next?

anyone read this?

Trying to download my course for medical school from a my.sharepoint link

whois 'adniat.com'

The first thing I programmed was a FL studio 12 keygen when I was 7.

I built a website that will be won by the first person to count to a million. Scripting is allowed.

free databreach leaks website?

Whats the most someone can do with these credentials?

CC EMV Bypass Cloning

Any idea why these zeros would appear in a text I received? Mostly one zero, a few doubles. 128 separate texts each with the zero or two zeros. I know the sender who said they have no idea how/why that occured (?)

What IRC client do you recommend for Mac?

I hacked in to a camera

Is there any program that I can enter a username and it will tell me all of the social media websites that username is associated with?

Is there any way to bruteforce my phones lock pattern?

China-linked hackers target US internet providers | Semafor

Eliminating memory safety vulnerabilities at source.

Princeton releases new open source AI agent for CTF challenges

Pictures deep search

BinaryShield: a bin2bin x86-64 code virtualizer

Followup on the guys arrested for a legal physical pentest of a courthouse + some ranting

Telegram Changes Policy, Says It Will Provide User Data to Authorities

Is Cisco ethical hacking course a good point to start?

How to tell if something is "hackable"?

Not to be a snitch-

Amazing video about the vulnerabilities of the mobile network by Veritasium

Project: Exfil Techniques using Proxy Library

socks5 proxy providers that allow SMTP?

10 Million Attempts per second

NMAP via socks proxy

Do you prefer old style malware or newer malware?

Food for Thought.

Just curious if these signs are easy to hack.

Introducing HackerOne Automations

Seeing The Matrix in theaters tonight for the anniversary!

Bunch of small updates pushed when connecting to new network, no updates on separate network?

Email spoofing date

Vulnerabilities in Open Source C2 Frameworks

Sniffing Bluetooth from phones for theft detection

Can someone find an IP to fix my relationship?

Hacker fight story

Someone may find this fun. Hit every single port. This is a base start. > GPT-4o: Lets say i wanted to send one byte to ports 1-80. Save the response in a postgreSQL database, for each port address. Run this all from a python script instead of C.

Bug Bounties from China

How to read/copy this smartcard (ISO 7816?)

How to register on the site if I am banned from ip?

Cryptography challenge part 2

How to do packet injection on a WEP wifi network on macOS Sonoma?

I’m actually scared man

Evading Windows Defender ML

Is there any site, tutorial or video that explains a known, patched vulnerability?

Self hostable undetectable VPN

YouTube member only streams

/r/Hacking has no active mods: let's discuss the direction of the sub.

Exposed: How Israeli Spies Control Your VPN

The Rise of Bug Bounty Programs in S-1 Filings: A New Standard in Corporate Security

How to find someone who has been missing for 1712 days illegally. A Kurdish girl from the Kurdish region in Turkey. The suspect is the son of a police officer protected by the Turkish state. The defendant is being carefully protected by the state so that he will not be found. He was probably killed

Password

From Prospect to Partner: Jon Stone Shares HackerOne Career Story

Quantifying the Value of Bug Bounty Programs: ROI, ROM, or Both?

Offensive Reading: A collection of research papers

DNSForge – Responding with Force

Photos and videos

From Prospect to Partner: Jon Stone Shares HackerOne Career Story

Y2KERSED: “Nostalgic” Malware

Red Team Infrastructure

Recover password

I'm using my custom C webserver to host my blog. No one managed to crash it yet ;)

wifi with steam deck

Made a WiFi pineapple clone

got this email earlier today , should I be worried ? 😟 😨

Anyway to know sent mail us read or not

Best learning resources?

The Rise of Hacker Culture

How do I download this?

Buffer overflows in the wild?

Fresh writeup for fresh linux kernel bug.

forever locked laptops?

Evolution of Hacking in Video Games 1985 - 2024

Pentesting for iOS Mobile Applications

What are hfxpo and zgalps processes?

Crushing FUD: Embracing Ethical Hackers to Strengthen Cybersecurity

How do I get Wi-Fi passwords from windows on external drive

crunch -s is not working? alternatives? fix?

Hacked device

If I had a website with Wordpress, could I hack it legally?

Approach to learning hacking

Game hacking basics.

weird emails

Got Junk Email from my own Email address.

iPhone 13 Pro IMEI number change

Click on pdf from mobile, any danger?

Is there a tool like odin but for apple?