Posts

Remove DRM from shaka-packager

Measure, Compare, and Enhance Security Programs with HackerOne Benchmarks

What's best for certifications? Fortinet or Splunk?

Attack Vectors of Quantum Computers - Sorin Boloș and Adrian Coleșa @ Quantum Village, DEF CON 32

Is there a way I can get the status code of a cross origin request with samesite CORS?

I created a WiFi attacker device using the ESP8266

If you send a cropped photo to someone via text, can they revert it back to the original?

Has the National Geographic website been hacked?

Lost rar password, apps to bruteforce?

Securing Our Elections Through Vulnerability Testing and Disclosure

What are some fun things to put on extra flash drives?

Looking for a fren

Having issues with Bettercap in VirtualBox

What order would you do these in?

Any source for malware persistence?

is there a way to crack a .des file using hashcat?

Why is there casually usernames and hashes on google and how to report it

New Windows Driver Signature bypass allows kernel rootkit installs

Russia sentences REvil ransomware members to over 4 years in prison

Amazon identified internet domains abused by APT29

STMP to SMS make sender not a email

My nephew was tasked with doing a research on why the Internet Archive was hacked ..

Umm.. is this supposed to happen? LINUX root access from A.I chat app.

Help for the Pwned

Complete guide to hacking 2024

When is port scanning considered illegal/legal issue?

Abusive family member, what to do

Vulnerability Deep Dive: Gaining RCE Through ImageMagick With Frans Rosen

Please read!

Compiling Original source code of Pokemon Platinum from 2020 leak under linux

Echo Show 5 - 3rd gen serial data

Why does Windows executable get corrupted when I remove part of the code?

Can I have search results related to my name hidden?

Live Target

8% of DNS Name Servers Have Zone Transfer Enabled

Digital Forensics

Ethical Hacking vs Moral/Legal Dilemmas

SECS660 or SEC565

Archive.org support tickets breached

You have $3000, which are you spending it on?

How much of doxxing goes beyond simple search of related account names, and what someone can infer from your posts. I.e. what part of doxxing is more advanced or hidden, i.e. being able to see deleted posts, browser, machine id inferred from hardware components, and such?

DLL proxying with golang

30 Cybersecurity Search Engines for Ethical Hackers

Cisco, has launched an investigation into a potential cyber security incident and has taken its public DevHub portal offline as a precautionary measure.

Door king 8077-011 clone

Memrise points

Huntress CTF

Why can't you PTH hashes from Kerberoast?

word list attack on wifi

USDoD arrested

How to corrupt/disable a flash drive upon insertion?

What's the prolabs order to follow.

Title

Ward Christensen, BBS inventor and architect of our online age, dies at age 78

Intercepting traffic from a smart ring

A letter to the Internet Archive Hackers

Trying to find info on Samsung Galaxy

How do I easily find an IP address past a VPN?

Where can I start?

Breaking in Takeaway terminal

My son's toy has a USB cable for charging

Requesting CISOs to help with a research project

dont destroy me i dont know much here

archive.org - why?!

Local OKC Hackers?

I got stolen.

How an IDOR Vulnerability Led to User Profile Modification

Uh oh looks like archive.org may have been breached

Bruteforcing an 8 character password

My password was leaked in plaintext from a data breach

Bruce Firmware comes to CYD

I received a pdf from a company I applied for a job at, it's supposed to contain the offer, but it's sketchy. Can I share with someone experienced here to look at it?

does anyone recall the following hack?

Hacked

OpenSSL Encryption or Password checking/hacking - AliExpress Vehicle Digital Cluster (Linux)

How would I find a team for ctfs

Never Ask

How does MSK is transmitted in pre-authentication phase in 802.1x authentication?

Thoughts on Chef Secure (Jesse Campos)?

the answer to how Israel killed and injured thousands of Hezbollah with pagers

does this existed before?

What are some advanced search features (e.g. for google hacking) you'd want to see added to search engines?

Hi, ik this is a stupid but just here me out

How to Execute a Virus Automatically on a Remote Computer After Downloading without physical access

Want to know what number keeps calling me .

Journalist hacks a popular robot vacuum — watches owner live through its camera

They are phishing

DOJ, Microsoft seize dozens of domains ‘used by Russian intelligence agents’

You can upvote/downvote archived comments

Samsung S23 Ultra Xfinity Lock

mobman 2

Telegram Confirms it Gave U.S. User Data to the Cops

Which is the most secure browser?

WhoYouCalling - A tool to get a pcap per process and much more