Posts

Learn how to use KiCad for your next electronic hacking project.

Was this guy faking?

How do I hack a phone app?

Hackers Likely Stole FBI Call Logs From AT&T That Could Compromise Informants

Friend Discovered Major XSS Vulnerability in a Popular Chatbot Platform—What Should They Do?

Old School Scary Hacks

What tools do console hackers use

What are you favorite wordlists for wifi passwords?

How often do criminal hackers actually get traced, arrested & prosecuted?

Im just curious.

Esp32

enthusiast keyboards

Bolstering cybersecurity of the healthcare sector

Zuck seems to claim that meta does not have ANY access to encrypted messages on whatsapp

Anyone tried these USB killers from China? Are they good enough?

A Partial Victory for AI Researchers

Snyk security researcher deploys malicious NPM packages targeting Cursor.com

ShmooCon 2025

A proof-of-concept encrypted covert channel using QUIC protocol headers

Chinese Hacker Group Targets Japan: 210 Cyberattacks Expose Major Security Breaches

IP Camera in the internal network. A threat??

I created a Cybersecurity Hub - All cyber tools and resources!

Tool for Android

When is it necessary to capture a request for SQLmap?

OS safety

How to unbrick a locked MacBook Pro? (Not stolen)

BugGPT now has over 50 exploitable web apps!

Close source vs open source Red Team tools

Hacker claims breach of US location tracking company Gravy Analytics

Help appretiated! I cloned the left 125mhz key onto the right one with the tool on the right. The copy works for the inside but it doesn't for the outside one. Could it be that the outside one uses the first sector whereas the inside doesn't?

How could one effectively remove all backdoor installed on a device

Ukrainian hackers take credit for hacking Russian ISP that wiped out servers and caused internet outages

Is this hacking?

Is there a way to solve this Google captcha?

How to establish RAT access outside home network?

Chromebook

Chinese hackers breach Marcos' office but PH downplays attack

How common are evil twin attacks for WiFi networks?

US officials increasingly worried over Chinese hacks | Semafor

Human study on AI spear phishing campaigns

What do you use for port scanning that won't get you banned/yelled at?

Mac Address

Not sure if this is the right place.

Should we really be using computers privately when they can be hacked?

Self-Hosting Revolution: Battling Scrapers with DIY DRM Solutions

My autonomous AI agent solved a Portswigger lab!

Cruise ship network

Do Indian Car Keyfobs Use Basic Last Code + 1 Systems Instead of Secure Rolling Codes?

US sanctions Chinese cyber firm linked to Flax Typhoon hacks

Could one hack hearing aids?

I got a que for all; if anyone can explain

network drops when scanning with Nmap Ft: kali Linux

How far away can hackers be when orchestrating man in the middle attacks?

De-DRM PDF with Fileopen

maldev on linux

Banger! 🎶 "Cyber Awareness Protocol" by RIFTX