Posts

Any stressers out there?

Reboot and firmware update useless: Thousands of Asus routers compromised

is there a way to undo Luraph Obfuscator

anyone know how i can bypass this?

Router access with SSH tunneling

Step By Step: OpenAI Model Resilience to TBTG Side - Channel Timing Attacks

Could i use this for hacking?

Victoria's Secret is maybe pwnd

APT41 malware abuses Google Calendar for stealthy C2 communication

Old HTC One M8 Phone

Marauder ESP32 with GPS + Battery Build Video

Comprehensive Analysis: Timing-Based Attacks on Large Language Models

How to duplicate an encrypted mifare key fob?

FrodoKEM: Bolstering cryptography for a quantum future

Is it possible to use virtual machines to practice different techniques and programs on the same system

Ubiquitous AI and wearables detection/hacking

U.S. Defense Intelligence Flags Rivals’ Growing Military Use of Quantum Tech

What vulnerability/campaign was in news in past 1-3 years where user copied text from website and something ran in terminal ?

Teach Me: how to run save file editor on my MacBook

Defensive System Prompt: a Short Study

TikTok videos now push infostealer malware in ClickFix attacks

How to reincorporate a modified JSON file into a video game.

Emummc is forced but not enabled failed to launch

Flagged for Review: Using Small, Stealthy, Flags to Check For LLM Stability

EU Commission pushes ahead with new EU-wide data retention

I spent 8 months trying to make LLMs Hack

Cool build, guild in the works!

You Can’t Do That, Agent

A First Successful Factorization of RSA-2048 Integer by D-Wave Quantum Computer

I made a usb killer

I’m tired boss. I can’t do another Audit season.

VPS recommendations

3AM ransomware uses spoofed IT calls, email bombing to breach networks

I wanna create a phishing site

How to bypass no audio screen recording in apple calls?

Is there any way to locate a particular participant in google meet?

Does WiFi Pineapple Mk7 log probe requests like the older versions?

Post-Quantum Cryptography Comes to Windows Insiders and Linux

Chinese firm launches ‘unhackable’ quantum cryptography system

SQL Injection Demo: SQL Vulnerable Web Application with Flask

Leveraging ChatGPT's Python Capabilities To An Attacker's Advantage!

How to Disable All DirectX 11 Rendering (Fully Headless)

Does anyone have resources on modifying a Ring doorbell to store video locally instead of reporting it back to Amazon?

Are industry certs like CEH still relevant in practical hacking or mostly HR filters?

Rogue communication devices found in Chinese solar power inverters

Has anyone used Frieren? (Updated WiFi Pieapple Cloner?)

Possibility of bounty

BBC NEWS: A letter from the M&S hackers landed in my inbox - this is what happened next

what app can I use for ethical hacking

Hashcat reports wrong RAR password. How do I continue cracking?

Today north american lighting in muscle shoals alabama was hacked.

How I made ChatGPT Hack PortSwigger

Large Language Command & Control

How to parse through large nmap scans ?

How easy is to brute force a SecShell protected android Apk

FBI: US officials targeted in voice deepfake attacks since April

Overthewire bandit10

Does anyone know what religious organization was hacked by aquatic panda?

Is it possible to MITM wifi direct connections?

Coinbase data breach exposes customer info and government IDs

Is there any way, ethical or not, to download the original HD image embedded here

Anyone that did the John Deere cyber tractor challenge?

Wardriving - what option is a solid first build?

How do i proceed?

Hackers claim deportation flights manifest and leave scathing message for Trump: 'You lose again Donnie'

Hackers is there a way to get.edu mail somehow?

Perfectly implemented safeguards undermined: Spectre attacks are back

mobile inspection tools

How to know if the file is actually malware or clean?

Can anyone crack the password of this file

Whats more difficult to hack; a website that uses iD.Me or a site that uses Socure?

Are there any loopholes in Telegram security?

🚀 Evil-Cardputer v1.4.1 with LLMNR/NBNS Poisoning & NTLMv2 Sniffing

High Level processes such as services.exe and wininit.exe not possessing service creation privilege?

fcat: cat on protein with fzf & zoxide smarts! 🚀

$190M DeFi Exploit Arrest, Microsoft Ends Windows 10 Support, U.K. School Cyberattack

Best ways to avoid reverse engineering?

OP adds: You can also get in just by calling a random flat and saying "it's a neighbour"

I created CutieAPI, a terminal-based, beginner-friendly API manager. Most beginners are intimidated by curl commands—I was one of them too! That’s why I built this tool to simplify API interactions in the terminal. Check it out and let me know what you think!

Is it illegal to hack for the following reason:

Ransomware Attack Data: Distribution of Attacks Over Time by Top 20 Groups (2023 & 2024)

Someone is posting sexually explicit messages and photos of my family member online can I do anything?

How safe/full of malware are emulators and roms?

Looking for Red-Teaming-TTP Contributors

Help modding Sony Blu-ray player?

Anywhere I can buy used Keylok II dongles?

Security audit

Identifying Website Owners

Why do connected smartphones display saved Wi-Fi passwords, making them easy for users to share with others? - Planet Vidya

GlobalX, Airline for Trump’s Deportations, Hacked | Hackers say they have obtained what they say are passenger lists for GlobalX flights from January to this month. The data appears to include people who have been deported.

Is anyone willing to hack someone for me it’s a good cause

My store has a problem with theft.

Packet capturing on Android/iOS

Is someone on my internet?