Posts

Reverse shell for RFID

big Twitter leak apparently?

why do hackers tend to always be progressive?

Voyage - Stateful subdomain enumeration toolkit

Anyone else doing the battery mod for the evil crow rf v2?

How to get all games for free?

Building a Remote Access Tool with AI?

Is this course up to date?

POS System Security Risk ?

Hackademia - 250+ free mini web app labs

What are some big and good password/dictionary list?

Why did my manager/it expert recommend this?

Anyone has any idea of how Sliver bypassed Crowdstrike?

This can't be real. Isn't this person associated with the white house? Is this how you bribe this guy?

Is CSRF attack a real threat for normal users ?

Recently discovered a potential data leak exploit in a unicorn startup. How should I proceed?

Is there any way to reverse engineer the hashes or know the logic the encryption program is using, if you already have some hashes and their encrypted results?

Meet Rayhunter: A New Open Source Tool from EFF to Detect Cellular Spying

Over 150K websites hit by full-page hijack linking to Chinese gambling sites

Resetting Telegram Bots Free Queries?

Evil-Cardputer šŸ˜ˆ Honeypot šŸÆ

Sticker technology?

Evil Twin

Apparently vibe hacking is now a thing

DedSec Project Update

Has anyone used Just Kill for escrow services?

A coworker brought this sticker back from DEF CON last year. Does anyone know who he is?

Is there any unethical way to edit the data in a "view only" google sheet?

Willing to work ?

GitHub Actions Supply Chain Attack: A Targeted Attack on Coinbase Expanded to the Widespread tj-actions/changed-files Incident

Exploiting LibreOffice (CVE-2024-12425 and CVE-2024-12426)

Have any good resources for binary exploitation?

Can someone do something with my IP adress?

Unprecedented Database Exposure Risks American National Security

Honeypot Brute Force Analysis

What are your favorite threat intel sources and techniques?

California Cryobank Hacked ā€“ Sensitive Customer Data Exposed

Inspect Element Issue

anyone who has read can tell me about this book?

Creating a Telegram Mass reporting tool from scratch

Unauthorised FEX.NET File Downloads (Open Source Tool)

Using vim as an intercepting proxy ( burpsuite alternative )

hack phone locked bootmenu

Architectures for understanding security of a product similar to system design

Best option for Bluetooth and WiFi hacking/manipulation? Laptop? Flipper0? Standalone?

Fortinet Cybersecurity Survey

How I Overcame My Fear of Researching & Why You Should Read Kevin Mitnickā€™s Story

Wi-Fi Gun DIY / Powerful Antenna for Wi-Fi !

Did I accidently hack local wifis?

We are all aware of anonymous

How to clone a door lock card to some nfc tags or phone?

What is the best way to learn something on the net

Have a crack at this:

I Hate Proprietary Printers

Memory Corruption in Delphi

when trying to access BIOS, I am prompted with this

China

Chinese cyberspies backdoor Juniper routers for stealthy access

So, I completely unintentionally "hacked" someones account... What happened??

Practice target for DDOS

Just wondering how he did this from just a email?

"Time bomb" hidden in code: developer sentenced

Tf is this corny shit šŸ˜­

šŸšØ HAPPENING AGAIN: Massive attack on X is ongoing. This is attack NUMBER 4. The attackers are relentless. Elon Musk says it is so well-organized it could be a country.

Flipper Blackhat

X locks the account of 2600 Magazine for posting DOGE members contact info

What can i do?

Trying to duplicate a fob but have had no success with two different duplicators, one at a locksmith and one at home. Any suggestions?

eSim transfer through compromised wifi?

Webcam Safety

If you wanna look like a genius hacker...

Making a client for Call of Duty WWII

Dept of Education ā€œEnd DEIā€ Form Submission Tool

Crunch syntax to create a ddmmyyyy wordlist?

Learning to use hashcat

Badbox 2.0 Botnet Hacks 1 Million Android Devices Worldwide

WiFi Pineapple Hacking Tool: Guide to Setup and First Attack

SANS be like

US charges Chinese hackers, government officials in broad cyberespionage campaign

Multiple backdoors injected using frontend JS

Lazarus Group skill set?

Is it finally impossible to mock location on Tinder and Bumble mobile apps?

Scam lures victims with Paypal "No Code Checkout" pages

Creating Keylogger with Raspberry Pi Pico W

Are you Hoodie gang, ski mask gang, Dark sunglasses gang or do you just rawdog the mainframe with no protection?

US cyber security: capitulation to Russia or a sign for negotiations?

Very Old School Hacker Conference Buttons

Massive security gaps discovered in building access systems

Someone is linking my email with thunderbird and trying to access all my apps. What do I do?

Weekly Red Team Newsletter

Cyber gang Cl0p: Data allegedly stolen from HP and HPE