Posts

CoinDCX DevOps Engineer Arrested in $44 Million Crypto Hack

Does anyone have RTX 5070 hashcat benchmark results?

Image Geo-location with OSINT

Why does bcdedit /debug on break my Windows, but works fine for the tutorial creator?

Hooking Indirect Jump in Android Native Code Crashes App

FBI and National Guard respond to crippling cyberattacks in St. Paul, Minnesota.

Jack Dorsey Drops Bitchat on App Store – But Experts Say the 'Private' App Is Alarmingly Easy to Hack

Hijacking Cursor’s Agent: How We Took Over an EC2 Instance

Spilled Tea - An 11-Hour Video Presentation of the Women of the Tea

My son wants to print these images but they do not save well, they are saved separately player and background.

Weaponizing AI Agents via Data-Structure Injection (DSI)

Any workarounds for Hinges paywall?

How I hacked my washing machine - Nex's Blog

aireplay-ng w/ rtw88_8821cu

During Operation Sindoor, India faced a surge of cyberattacks, allegedly from state-backed and hacktivist groups in Pakistan, Bangladesh, Maldives, Turkey, and with possible Chinese involvement. The electricity grid alone reportedly endured around 200,000 attacks.

Kaspersky highlights top risks of Quantum Computing

how do i calculate zip bomb sizes

How do I get into it as a beginner?

How to gain reliable info from an IP address to report it

We put a malicious USB cable with a hidden keylogger in our $30k X-Ray machine and took a look inside

Any good resources for game hacking?

WhoFi: Deep Person Re-Identification via Wi-Fi Channel Signal Encoding

Does anyone here use NixOS for their pentest work?

Personal Data and Privacy Concerns

Off brand AirTag owner

Which forum is this from?

Which forum is this from ?

Stealthy cyber spies linked to China compromising virtualization software globally

Cloning a fob

Offensive Security Course Deals on Udemy, Cyber Law Discussion, SC-200 Playlist, Kanary App (Cybersecurity Club)

Is there anyway I can ask someone to try and track me online?

Windows Seven Admin Password:

WiFi Attacks (educational)

Apple Backdoor for Government Loses UK Support, SS7 Vulnerability, Dell Says 'Fake' Data Leaked

Getting encrypted message from audio

So, just recently, something worrying happened

Startup Selling Hacked Data to Debt Collectors, Crypto Mining Attack on 5,000 Websites, Microsoft Patching SharePoint

[Career Advice] I love Linux, but not sysadmin work — what cybersecurity path should I choose?

remote webcam access

Should I start with kali or parrot?

GoHPTS - Transparent proxy with ARP Spoofing and Traffic Sniffing

Samsung galaxy A8 stuck with Hexnode software

US Army National Guard Hacked by Chinese Threat Actor, Al Apps Risk Personal Data, Dark Side of Al

US Army National Guard Hacked by Chinese Threat Actor, Al Apps Risk Personal Data, Dark Side of Al

Best RATs in 2025? (Remote Access Tools)

Cybersecurity News: Week of 7/13/25

Is there a way to access ALIEN TXTBASE? If so, how?

Phishing For Gemini

I've jammed five years of red teaming TTPs into one PDF for you 🫵

Will a yubi key prevent something from hacking into your computer?

NVIDIAscape AI vulnerability uncovered

LLMs in Applications – Understanding and Scoping Attack Surface

Recon-ng: A Powerful Reconnaissance Tool

Fake Apple Support Pages are making Users Run Malware Scripts

M5Stick C Plus 2 Hotswap Board

Hp wolf security

How do I turn this into a custom OS device so I can have an extra display for my laptop?

I built a Watch Dogs-inspired Termux toolkit for anonymity, control & digital resistance (free & open-source)

One of my favorite Enumeration TTPs. How to harvest Azure subdomains to identify a target's attack surface

Hackers exploiting flaw in widely used Wing FTP Server

Cybercriminals Weaponize Cracked Games as Global Traps Targeting Gen Z Gamers

Trump administration to spend $1 billion on 'offensive' hacking operations

Elmo’s X Account attacked to Post Antisemitic Hate, Call Trump a ‘Child F–ker’

I fine-tuned an AI model on 50k malware samples

Okay guys is this less janky now?

Unconventional Shellcode Delivery (Evasion Achieved) — Unsure Where to Go From Here

NovaHypervisor: Defensive hypervisor against kernel based attacks

Looking to located someone who stole a bunch of money from me then skipped town.

Bit of a hail mary for a novel I'm drafting.

I hacked my hotels wifi

Writeups .

Does this look better?

I hacked macOS the way no one did before! Unlocked the Dock!

McDonald’s AI Hiring Bot With Password ‘123456’ Leaks Millions of Job-Seekers Data

That one bug

Reverse Engineering on APKs

I’m worried that somebody is going to spam my business page

McDonald’s AI Hiring Bot Exposed Millions of Applicants’ Data to Hackers Who Tried the Password ‘123456’

Would you like an IDOR with that? Leaking 64 million McDonald’s job applications

I lost access to my old dropbox

Modern Techniques for Evading EDR and AV

Currently trying to Hex Edit an .ACT File for the game Silent Hunter 3

The Ethical Hacker Hunting Predators and Saving Lives Online (Ryan Montg...

Alleged Chinese hacker tied to Silk Typhoon arrested for cyberespionage

redTeamerAtHome

I forgot the password to a .zip file I made years ago. I used an online John the Ripper to get a hash, wtf do I do with the hash now?

Delete Yourself from the Internet: Why You Must—and Exactly How to Do It

How to Use Sudo 1.9.13 Exploit?

Launched my brand Omoro!

100 Stars on My Project Thank You!

How Broken OTPs and Open Endpoints Turned a Dating App Into a Stalker’s Playground

Reverse Engineering Anti-Debugging Techniques (with Nathan Baggs!)

Extract WhatsApp Chats from Desktop

Extract WhatsApp Chats from Desktop

Hacktivists are conservative now?

Risks of a Consoladated Citizen Database. Will it be under constant and sophisticated attacks?

Keygen Ableton 12 Suite

Even secure wallets fail if the terminal is broken

The VPNs and attack boxes of HtB and THM facilitate unrealistic expectations of connectivity. And It's against Terms of Service for any YouTubers to explain the nuances contained in this image that I have ham-fistedly created to help you pop shells (or perhaps now know why you haven't been). Cheers.

Brute force

I extracted 42 zip

Nevada's New Cybersecurity Program

Qantas airline hit by cyberattack, affecting millions