Posts

Remote Code Execution via Man-in-the-Middle (and more) in NASA's AIT-Core v2.5.2

Detecting IMSI catchers

How HackerOne Employees Stay Connected and Have Fun

Legality of making a infected USB for personal use

Maytag washer and dryer

Is someone imitating my router?

Better together

I just brought back 42.zip

Steganography tool - stegashade

Navigating the Leap: My Journey from Software Engineering to Offensive Security

Where can I release my program

AI in SecOps: How AI is Impacting Red and Blue Team Operations

My Wifi Attacker Is Now Open Source On Github

Troublemakers at Reddit

Huey, Dewey and Louie on the go

vipdongle.com legit service?

Spelunking in Comments and Documentation for Security Footguns

Found old harddrive

Wifi pineapple enterprise

How REI Strengthens Security with HackerOne’s Global Security Researcher Community

I’m building a team

Linkedint tool - not working. any good alternatives?

possibility of hacking a esp32 in usb device mode

Someone is trying to lure me to open a RAR file

WiFi pineapple DIY

What would this malicious command do if I were to run it on my computer? A popup essentially told me to put it in the run window.

Gigabyte 9th Gen BIOS modding/hacking

can I hack this?

Non hacker requesting a discussion of the election fraud claims made by Stephen Spoonamore in this letter to the VP

AI in SecOps: How AI is Impacting Red and Blue Team Operations

Given an executable, what's a safe way to check its behavior?

Fake AP to capture a handshake?

Hacking beginner tips?

bypassing the login credentials portion of a simple aimbot?

How HackerOne Disproved an MFA Bypass With a Spot Check

I think i've done too much

Modern WiFi attack surface?

Idk where else to ask but what am I compromising if I give up my PayPal info in order to receive money? Info in comments.

Simulate Network activities?

GentilKiwi's PN532 NFC relay device

Bluesnarfing tutorials

give me a starting point on grabbing a criminals phone's ip info, camera access and location. like where do i start and how?

Port Scanner

Anyone know anything about this?

Hiya my neighbours WiFi how can Ä« get in

FBI: Spike in Hacked Police Emails, Fake Subpoenas

Your thoughts on hardware MFA? (Yubikey, uTrust etc)

Win32.Trojan.Krynis -- A full Malware Analysis.

I went out and when I came back my computer was open in BIOS. Did my roomate did this?

Why a Cybersecurity Prodigy Carried Out a Hacking Spree

Does anyone can brute force android lock patterns?

Friendly reminder

I Hacked NASA and they thanked me for it - Ask Me Anything!

Credit

do hackers ever break into another criminal's network/online accounts and turn them into the police IRL?

Win32.Trojan.Japaneno - A full Malware Analysis.

According to you, which one of these branches is more fun and pays well?

Called a spam number by mistake and they answered immediately, there was no ring or anything

How a Cross-Site Scripting Vulnerability Led to Account Takeover

How would I go about downloading a file from a website using the windows run application?

I found a key Logger and a hidden trojan on my pc

Want to get better at CTFs( web exploitation and dfir. Any good tutorials/ resources???

RFID/NFC copying question

I downloaded a torrent file and i got this txt file with the main file. Should i be worried?

What's better for certification? Splunk or Gemalto?

Evilginx

Something interesting to try hacking?

Old YouTube Account

In what do most modern exploits rely on?

Issues with hashcat.launcher

What's the best way to recover a winrar password?

DEF CON 32 - Abusing Windows Hello Without a Severed Hand - Ceri Coburn, Dirk jan Mollema

Which wires to hack speed queen?

Vatican and Israel implicated in Italian hacking scandal, leaked files reveal