Posts

An open letter to Anonymous.

how to gain code execution on millions of people and hundreds of popular apps

Force port forwarding on a locked

What tool did Matthew Van Andel downloaded from Github?

What attack is this ?

A story

DOGE email AI

RFID Mifare2k cloning

[Hand-Written Paper Implementation] Asymptotically Fast Factorization of Integers for RSA semiprimes

Bypass a web filter

Isolate network traffic for analysis from one application

I used DeepSeek to hack ChatGPT. They way I did it is fascinating. I have the whole thing documented.

Silent Push Pivots into New Lazarus Group Infrastructure, Acquires Sensitive Intel Related to $1.4B ByBit Hack and Past Attacks

Can someone clone your car key's unlock signal by sitting next to your vehicle in a parking lot and waiting for you to come back to your car?

US Charges Michigan Man for Buying Stolen Credentials on Genesis Market

Safest Way to Create Wireless IoT Testing Environment?

DEF CON vs. Hadnagy Legal Update

Bybit Heist Exposes North Korean Cyber Threat with $1.5 Billion at Stake

The Tick ā€“ Your New RFID Gremlin!

How do I use John the Ripper?

How do I brute force a password for rar files?

Data leak at Thermomix: data from 1 million German users on the darknet

What if a throwaway account you created is hacked later and used to commit a crime?

Cloning a website

Hackers steal $1.5 billion from exchange Bybit in biggest-ever crypto heist

Grok is cool, chatgpt is not

Breached data

Hi!I am in deep trouble

CEH vs Job market

How to backdoor large language models

CTF beginner

How a VPN Secures Your Web Traffic (OC / Graphic)

Happy Hippo Hacker

An inside look at NSA (Equation Group) TTPs from Chinaā€™s lense

A Compilation of Hacking Tools and Learning Resources

What level of skill would it actually take to cause change in the world?

Wordlists for FFUF

ChatGPT but for hacking

Hack the Box - Active (Impacket) - Part of a live hack a long stream I did with my podcast community last week

Cracking Gitea's PBKDF2 Password Hashes with Hashcat

Would it be possible to read a 125khz proximity card and replicate the signal with the same device?

Looking for a Computer Science & Cybersecurity Tutor (Paid)

2FA codes while changing the clock

Security focused travel router

Funniest phishing domain I've ever seen

I saw Elon was using Grok-3 via X... figured out how to get access šŸ™ƒ

Felt the need to ss this

"Puppygirl Hacker Polycule" Leaks 8,500 Files from Lexipol, Exposing Police and Firefighters

How North Korea Makes Elite Hackers

Good programs for cybersecurity?

I didn't click on that phishing email

Did some light enumeration, pcap work, and python exploitaiton on the CAP HackTheBox machine last night as a way to start streaming with my podcast community, wanted to share with you all

Leveraging AI to De-Obfuscate large .js Files

Am I the only one who sees Musk's hat for what it is? It's like he's begging to be called out.

Offering a $1000 bounty to anyone who can get into my Reddit account by Dec 31

Flipper Zero Ethical Hacking Tool: The Complete Beginner's Guide

What was the endgame of this hack?

What do guys think of this DeepSeek AI, my avast web security detected a web threat from its website. Do you guys think that they were trying to hack its users?

Is the MacBook air with M3 good?

This one guy dmed me

DeeperSeek now lets you automate most things on the DeepSeek website! Automate messages, access all types of data, switch accounts,get messages much more faster than before, logout of current accounts, imitate human typing with customized delays, and much more!

Women@ Kicks Off the Year with a Vision Board Event

been trying for months to bypass this product key screen, since the service has been down for years.

US cyber agency puts election security staffers who worked with the states on leave

Internet Service Providers (ISPs) are becoming the primary entry point for hackers.

Spare phones

Gain Actionable, Data-backed Insights with HackerOne Recommendations

Spambot registrations

Teen on Muskā€™s DOGE Team Graduated from ā€˜The Comā€™

CEH practice: Using ADExplorer.exe to find a password

most secure router/modem?

is there any point in bringing back GreySec?

Jack the ripper for ntlm password cracking

Motives query

Problem performing MITM attack using arpspoof and urlsnarf.

Privacy from ring doorbell cameras

How to record apps that block screen recording on Windows 10/11

How plausible are reports of DOGE team accessing agency database in US gov?

Has anyone taken a look at join.doge.gov?

why are the vast majority of hackers anti-israel? also why are there so few Jewish hackers post-2016?

Welcome, Hackbots: How AI Is Shaping the Future of Vulnerability Discovery

Hacker arrested for attacking US military and NATO Researchers began their investigation in February 2024.

Anyway to get an infinite sims card ?

Have a rar file with ald old project I can't remember the password for. Is there any easy..ish way to crack it?

WiFi Hacking

I Built a Crazy Simple Tor Chain Balancer to Hide Your Stuff from the Prying Eyes

Man in the middle using SS7 to hack a phone number

What is the best wordlist?

Whats the feasibility of this guys story?

New domains or forum sites as like Cracked.to/io or Nulled?

Does AI interact with you on social media with fake profiles?

Is it just me who presses on links with 90% malware chance

What's your XSS methodology?

Has anyone seen a Samsung Galaxy Smart tag 2 microphone mod?

VPS Providers and Proxy lists?

Has anyone hacked one of these?