Posts

Es posible hackear un WhatsApp y un Messenger?

Millions of Apple Airplay-enabled devices can be hacked via Wi-Fi | Hackers can run their code on AirPlay devices thanks to a collection of bugs known as AirBorne.

Android debug menu

Looking for someone good with tapping into APIs

Quantum Computing Threatens Cyber Defences Globally

Apple News API endpoints

How do I get past this screen??

How do cyber criminals make money in 2025?

Just dropped www.brokenctf.com – it’s weird and it’s broken

Factory reset without admin password?

how do you know if a wifi connection has an (IDS)

Looking for red team tools that enable email domain spoofing (DMARC=none). Suggestions?

ChatGPT: Overdrive HackerTool-5o

Flipper Blackhat - April Update

for games, what do you think the difference is between a hack and convenience?

major botnets that have been reverse engineered or source code public

Hi guys where can I learn more about how jail breaking on ps4 or any other devices. works, most on the YouTube I can find how to use it.

6 years later, does anybody know how they are enforcing bans?

how to get hack and get unlimited internet

WiFi Pineapple never arrived.

How to avoid having your crypto wallet stolen

will these rat my device

I suck at wiring, why isn’t the touch screen working?

i dont understand JWT refresh tokens

Anyone want to track down & report an animal abuse video taken last night?

My TTP was published in the MITRE ATT&CK Framework. Let's goooooo

Just got my dstike deauthorizer watch x/se

Why is this happening? Knowing that end-to-end encryption happens on device.

FBI: US lost record $16.6 billion to cybercrime in 2024

This is how to hack 101 right??? /s

About the recent crosswalk hack

Samsung pad

My kid set a bios password and forgot it on my laptop

Has any of the cheap Chinese mini PCs ever been found to have backdoors or other problematic stuff?

How much can a hacker do with my name, home address, and email address?

UN warns of massive cyberscams spreading across the world

after a rabbit hole of knowing how encryption works, from basic to intense. how would you decrypt a "super-bug" encryption.

DIY Ble/wifi Jammer

25 Year old College student at a crossroad in life.

breachforums?

How A Hacker Used My Staging Environment for Phishing

What to do?

Why can't devs just write invulnerable software ?

I want to Hack/Jailbreak my MegaChef Pressure Cooker…

Tracing a spoof text.

Sounds reasonable

Cross-Site Websocket Hijacking Exploitation in 2025

VHF School PA Hack

How do public free wifi redirect you to a login page?

Over 16,000 Fortinet devices compromised with symlink backdoor

What are some good places to learn about CVE’s/how to hunt for them?

What Type of Script Are Hackers Using to Beat Individual Recepient Limits in M365?

Recovering data from a server

Notorious image board 4chan hacked and internal data leaked

Controlling "Smart" appliances - advice on getting started?

Cybersecurity firm buying hacker forum accounts to spy on cybercriminals

the nigerians hacked my account ggs it’s over for me they literally changed my email and everything

Crosswalks in Silicon Valley hacked to play satirical messages from Musk and Zuckerberg sound-a-likes | City officials have disabled crosswalk voice announcement features, for now.

Cracked forum and Sellix back under new domains

PRISM: Prompt Risk Identification via Semantic Modeling

Open Source MacOS Cryptojacking Mining Malware

DedSec Project

How to hack a USB device?

What is this guy doing? Device on roof said Silvus. Said they were for large data transfers. Was in a residential neighborhood.

Impersonating merchants, hackers are stealing millions in EBT food money

Low Power Device to deauth constantly

The coolest Marauder I got

OpenSSL 3.5.0 now contains post-quantum procedures

TIL Timothy McVeigh was into hacking

Extract .d files?

VibeScamming — From Prompt to Phish: Benchmarking Popular AI Agents’ Resistance to the Dark Side

Would it be possible to reverse a FB marketplace ban?

iPhone 15, very concerned because I downloaded the spectrum tv app and it says there’s more then 50 devices found, I only have one device and my only Bluetooth is my AirPods, what’s the cause??

Open source AI based code scanning with SAIST

Looking to intercept and store data from a local device on my network.

Want some advice from someone working in the industry on a project I have been working on.

Can 2FA apps be hacked?

Data

How do you find the time/energy to train?

We are hackers, researchers, and cloud security experts at Wiz, Ask Us Anything!

Someone hacked ransomware gang Everest’s leak site

Remote Rootkits: Uncovering a 0-Click RCE in the SuperNote Nomad E-ink Tablet

Voyage has a new release. Check it out!

Eavesdropping on smartphone 13.56MHz NFC polling during screen wake-up/unlock

Is it still possible to hack the admin page on a modern router?

SITM attacks are becoming more common in the wild

Lucid telegram channel?

Is this a hacking technique ?

Hacking bitdefender

Caissons or no caissons?

Dumpster Diving

Announcing zxc: A Terminal based Intercepting Proxy ( burpsuite alternative ) written in rust with Tmux and Vim as user interface.

tj-actions hack started in Dec 24 with SpotBugs compromise

Modded M5 stick plus 2 with external antenna and upgraded battery

NetCat POST requests

Suggest me changes to my career-path

Oracle attempt to hide serious cybersecurity incident from customers in Oracle SaaS service

Check out this video if you want

Subdomain enumerator with superpowers. Try it out!