Posts

Why proxies don't work on windows?

How do screenshots/recordings get take without victim knowing

What is something ppl think hackers can do but rlly can't?

Police dismantles HeartSender cybercrime marketplace network

How to learn without resources

What is this ??

Anyone have experience with the CY-39 Interceptor Platform?

Backdoor infecting VPNs used ā€œmagic packetsā€ for stealth and security

Chinese operation tried to overthrow Spain

Nulled.to / Cracked.io / Sellix.io / StarkRDP.io all gone

How to unlock a pdf file

pulpocaminante/Stuxnet: WMI virus, because funny

The HackerOne Cake Story

What Will a New Administration and Congress Mean for Cybersecurity and AI Regulation?

Searching for leaked credentials

How to guess a four-digit password?

Reliable Key Logging Device for Use on Windows?

Apartment gate

ESP32 BLE TX power for BLE spam

Exegol: professional hacking setup

How to access the cctv at my home without knowing it's password?

can i turn a ingenico desk/3500 into a custom receipt printer?

Simplified Threat Intel gathering - Kali Linux Tutorials

Any way to clone my apartment access key?

Beef username and password

Suggestion for bypassing anti-debug measures using LD_PRELOAD flag (CTF)

Custom as a mean of defense.

Hope in the Fight Against Cyber Threats: A New Yearā€™s Message to CISOs

Random Google searches extension

Trouble

What are the everyday Os or tools do you use as Cibersecurity profesional?

Hope in the Fight Against Cyber Threats: A New Yearā€™s Message to CISOs

Reading about real cyber crimes

Why is FRP seemingly so hard to bypass

Remote access hardware

PIR/microwave motion sensors

Locating A VOIP Number

I condensed my inconsistent 20+ hours with hacking simulator Cyber Manhunt 2: New World's 1.0 release into a three-minute review.

Never hacked before but want to start

TarantuLabs passed TryHackMe! Hundreds of free exploitable web-apps, hundreds of daily users, and one single developer with a request

Introducing Lightspark's Public Bug Bounty Program

If you know you knowā€¦

Looking to know if anyone know where the CL0P ransomware gang published their findings?

How to look like a unique user when logging into 100+ accounts from the same device?

Data Breach at the office

Identity theftā€™d, can I find the guy?

Android hacking

Legalities of ethical hacking & repercussions, whereā€™s the line in the sand ?

About the gas drain vulnerability in smart contracts

Learn how to use KiCad for your next electronic hacking project.

Was this guy faking?

How do I hack a phone app?

Hackers Likely Stole FBI Call Logs From AT&T That Could Compromise Informants

Friend Discovered Major XSS Vulnerability in a Popular Chatbot Platformā€”What Should They Do?

Old School Scary Hacks

What tools do console hackers use

What are you favorite wordlists for wifi passwords?

How often do criminal hackers actually get traced, arrested & prosecuted?

Im just curious.

Esp32

enthusiast keyboards

Bolstering cybersecurity of the healthcare sector

Zuck seems to claim that meta does not have ANY access to encrypted messages on whatsapp

Anyone tried these USB killers from China? Are they good enough?

A Partial Victory for AI Researchers

Snyk security researcher deploys malicious NPM packages targeting Cursor.com

ShmooCon 2025

A proof-of-concept encrypted covert channel using QUIC protocol headers

Chinese Hacker Group Targets Japan: 210 Cyberattacks Expose Major Security Breaches

IP Camera in the internal network. A threat??

I created a Cybersecurity Hub - All cyber tools and resources!

Tool for Android

When is it necessary to capture a request for SQLmap?

OS safety

How to unbrick a locked MacBook Pro? (Not stolen)

BugGPT now has over 50 exploitable web apps!

Close source vs open source Red Team tools

Hacker claims breach of US location tracking company Gravy Analytics

Help appretiated! I cloned the left 125mhz key onto the right one with the tool on the right. The copy works for the inside but it doesn't for the outside one. Could it be that the outside one uses the first sector whereas the inside doesn't?

How could one effectively remove all backdoor installed on a device

Ukrainian hackers take credit for hacking Russian ISP that wiped out servers and caused internet outages

Is this hacking?

Is there a way to solve this Google captcha?

How to establish RAT access outside home network?

Chromebook

Chinese hackers breach Marcos' office but PH downplays attack

How common are evil twin attacks for WiFi networks?

US officials increasingly worried over Chinese hacks | Semafor

Human study on AI spear phishing campaigns

What do you use for port scanning that won't get you banned/yelled at?

Mac Address

Not sure if this is the right place.

Should we really be using computers privately when they can be hacked?

Self-Hosting Revolution: Battling Scrapers with DIY DRM Solutions

My autonomous AI agent solved a Portswigger lab!

Cruise ship network

Do Indian Car Keyfobs Use Basic Last Code + 1 Systems Instead of Secure Rolling Codes?

US sanctions Chinese cyber firm linked to Flax Typhoon hacks

Could one hack hearing aids?

I got a que for all; if anyone can explain

network drops when scanning with Nmap Ft: kali Linux

How far away can hackers be when orchestrating man in the middle attacks?

De-DRM PDF with Fileopen

maldev on linux

Banger! šŸŽ¶ "Cyber Awareness Protocol" by RIFTX