Posts

EPSS is a lagging indicator. VEDAS gives early warning by tracking and scoring exploitable vulnerabilities.

regain account access

Unbearable neighbor

How to disable manager CCTV's one camera

Bruce FW Smoochie V2 Board

🚨 Hack Our Smart Contract, Keep the ETH – $500K Open-Source Heist Challenge Is Live

M5stickc plus 2 and PS5 controllers

Comment karma sympathy hack hacked

16 billion credentials: No new leak, lots of old data

is there a new breachforums domain?

Israel-tied Predatory Sparrow hackers are waging cyberwar on Iran’s financial system | The hacker group has destroyed more than $90 million held at an Iranian crypto exchange.

Temporary hotline for promotional material

Accessing PC on same network

How do I find my sisters phone number?

Shooting Bugs-in-a-Barrel With AI-Driven Binary Analysis on a TOTOLINK Router

Hacking. 2 people ending games on command.

Washing machine

Reusable streaming dongle or trash it?

Uses of rooted android 8.1

AI Red Teaming Opportunity. Win upto 100,000

Apple: Prepare your network for quantum-secure encryption in TLS

Hackers switch to targeting U.S. insurance companies

Software cracking / parallel key bypass

Is it plausible to gut a calculator, replace the mainboard with a Raspberry Pi and give it API access to some AI?

Hackers claim to have secured the details of 64 million T-Mobile customers

Watch Dogs IRL?

Post-quantum cryptography in Red Hat Enterprise Linux 10

Anybody here know of ANY community thats into jailbreaking smartboards?

Would swapping out a gateway potentially change my ip and put a stop to a current dos.

Orange Quantum Defender: Cybersecurity in France

Does Anonymous do anything anymore or are they washed up?

I don't get hash cat.

Hoxha: A userland rootkit

Is there a way I can hack either this vending machine or the attached pos console?

Odd message for cornhole, but it is northern virginia

Creating an anomaly based detection system for AI agents

I had a dream

Would anyone be able to advise me as to why I am unable to duplicate this fob I have using the device in the third image. The device can read (it senses the tags that it came with) and write (I accidentally erased my apartment key and had to get it reset). So why can’t it scan my apartment fob?

Selling Old Equipment

Way to hack someone that’s impersonating me

Hacking forums / chats

Looking for learning resources

Hacking Lab: How to Use SEToolkit for Phishing Attacks (WebJacking Exploit)

Hello im new i dont really know if this gonna be good ?? Its about a video game (i DONT want to hack on the game or wtv)

How do I find someone’s IP address?

Trying to warn site they may get hit wit DDOS

How to do?

connection acting strange at times

will remote keyloggers work if you disconnect from the internet? also, once you delete the malware file, is your pc now safe?

This has nothing to do with hacking

Boost Your KiCad Skills: 10 Essential Schematic Design Tips

How to access my grade card

confused about a few Iogs

Caracal – Hide any running program in Linux

when i do a check on my email it says i been pwned

Prompt hacking: Turning Apple Intelligence writing tools into a chatbot

How to spoof mac address without being picked up on Spectrum app

Nearly 94 Billion Stolen Cookies Found on Dark Web

Hacking... IN... SPACE

Password locked pi zero, is there any way someone could still access the files?

LLM meets Metasploit? Tried CAI this week and it’s wild

Frustration with Windows Defender - Windows 11 Home

THOTCON 0XD "Exploring Human-Tech Augmentation Myths" Slides

Hacking Tutorial: How to Use SEToolkit for Phishing Attacks (WebJacking Exploit)

Costco "Almond Joy" Hack 🔥🔥🔥🔥🔥

Bug bounties?

Wigle Android App

Comprehensive proxmark/RFID course or tutorial?

Freedom Wall Impersonator

Am I just wasting my time trying to get my account back?

Does WinRAR keep logs of the used passwords?

What was this new device that had a screen and a keyboard and allowed hacking?

Scamming website shutdown?

1975 paper : Generators for Certain Alternating Groups With Applications to Cryptography

Hiring Hackers