Posts

what to do with the m5stickC (plus/dev kit) or the m5stack compuper?

Rethinking Cybersecurity Training: A Path for Career Transitions

Public demo for Cyberbro (observables / IoC analysis)

[Termux] ettercap error etter.conf

πŸ” It is in our best interest to Not waste our precious time on quantum encryption. Quantum computing is a hoax.

anyone know this stresser site?

The U.S. Government Is Secretly Using These Devices to Track Us

Reverse engineering scam APK file

How to Appy What You learned ft: BugBounty

Could hacking energy grids aid sustainable development (ethically)?

Facial recognition - stuck after Pimeyes results

Suggestions For Laptop

Update: radioSphere Now Captures Device Info from Fake Pages !!

Autonomous bug bounty agent - meet AEye

Any way I can find out a windows 11 pin?

Exploit potential in ELF Shenanigans? ANSI escape codes in ELF section names makes objdump output light up! Surely there is some fun mischief to be had here. Starting PoC timer now...

What programming language consistently had the most vulnerabilities during app security review/ bounty hunting/ looking for 0 days for funsies or enterprise over your career

got this mp4 player, any ideas on how to hack/mod it??

Networking roadmap

Hacking Energy Efficiency: A Skill for the Future?

Accessing Loved One's Files [Please check my work]

The Breachies 2024: The Worst, Weirdest, Most Impactful Data Breaches of the Year

Problem with serveo.

JWT bypass

Getting a message of a robot on the n/w when I visit websites thru PC browser

ITALC Explain

is there a way to run alfa AWUS039NH on mac?

Does anyone remmeber this Github bug bounty story?

i have got a Toyota corolla 2024 and i'm really curious if there is a developer menu on the multimedia screen and see if it is android

GitHub - stanfrbd/cyberbro: A simple application that extracts your IP, domain, hash from garbage input and checks their footprint using multiple services.

Is SlickStack a Malware?

How to determine if a Linux group allows root access?

China-linked hackers spark global concern| Radio Free Asia (RFA)

Docker container access to host protected files without sudo using --privileged flag

2024 Gift Ideas for Experienced Hackers

What is the best way to figure out how to obtain a password or hack a website?

Hosting a presentation for High School computer science classes, looking for some materials that could best spark a teenager's interest in the field. Advice?

How do I get more credits?

Challenge, 6-12 months. Try your best.

Can someone shed some light on the Chinese Tp-link router cyberattacks? How compromised are we?

Help with ideas please.

I have an old winrar file and I know what the password is supposed to be, but I think I mistyped it when I encrypted it. Can someone walk me through how to tell hashcat what code to use in this regard?

CISA and FBI Raise Alerts on Exploited Flaws and Expanding HiatusRAT Campaign

Does FBI really cares their old leaked data?

What happened to Samy Kamkar?

Wifi adapter pineapple or Alpha

New York Releases AI Cybersecurity Guidance: What You Need to Know

Trying to find the tool used in this video

Open sourcing wireless speaker

Evil Coggie

aircrack-ng showing two virus threat detections Windows defender.

is GuidedHacking worth the money?

DedSec Project Update

Generic laptop docking stations

Bought a used router could it be compromised?

DedSec project guy...Big Problem

Hack My Career: Saskia Braucher

Tutorials for PRET

Freebox pop custom firmware

Is hacking using wifite actually illegal?

Collection of Cybersecurity Resources

oscp vs pnpt vs cpts

uhhhh, why is my background replaced by dots?

hackthissite.org is down for me for the past few weeks. Am I the only one?

Introducing the Wells Fargo Public Bug Bounty Program

Hai’s Latest Evolution: Intelligence, Context, and More Intuitive UX

Software trial licence about to expire - Can I save current state with x64dbg?

I think someone IS hacking my wifi

Someone’s trying to hack into my Microsoft account - is there anything I can do about it?

Any Resources for AWS Cloud hacking?

Root Shell on Modem

I want to start ethical hacking for bug bounty

just how easy/hard is it to hack a smartphone?

Shady restaurant (maybe) WiFi scam ?

.xls password protected sheet

Possible to get text messages...

Watch Dogs irl project.

Windows 10 PIN not affected by chntpw from Linux?

Is hacking even feasable in this modern defenses?

Working on a BBP. Need some fresh ideas.

Hydra - Titan - Email address

Do you think hackers might try to get rid of cctv footage connecting to the guy who shot the UHC CEO.

are hardware/laptop keyloggers a thing and how do they work?

How to unlock a pdf?

How to use a UUID?

Ukrainian intelligence hackers disrupt Russia's Gazprombank, source says

5 Questions to Assess Your Organization’s Bug Bounty Readiness

FireCompass Unveils Industry's First Agent AI for Ethical Hacking & Autonomous Penetration Testing

New Phishing attack : Hacker are spoofing official WhatsApp number and sending phishing link through SMS in the same conversation as verification codes from 2019 (German)

Laundry Machine at apartment unit

How to let state government know that a form has a vulnerability? (USA)

Breaking Down Adversarial Machine Learning Attacks Through Red Team Challenges

18 hacking books for $36 (Hacking 2024 Humble Bundle)

Would you be able to ddos someone using several virtual machines?

New WiFi Deauther Design

Connected but no internet

How good is a skilled hacker at tech support most of the time?

Is it possible to change “last modified date” from Google drive files?