Posts

I fine-tuned an AI model on 50k malware samples

Okay guys is this less janky now?

Unconventional Shellcode Delivery (Evasion Achieved) — Unsure Where to Go From Here

NovaHypervisor: Defensive hypervisor against kernel based attacks

Looking to located someone who stole a bunch of money from me then skipped town.

Bit of a hail mary for a novel I'm drafting.

I hacked my hotels wifi

Writeups .

Does this look better?

I hacked macOS the way no one did before! Unlocked the Dock!

McDonald’s AI Hiring Bot With Password ‘123456’ Leaks Millions of Job-Seekers Data

That one bug

Reverse Engineering on APKs

I’m worried that somebody is going to spam my business page

McDonald’s AI Hiring Bot Exposed Millions of Applicants’ Data to Hackers Who Tried the Password ‘123456’

Would you like an IDOR with that? Leaking 64 million McDonald’s job applications

I lost access to my old dropbox

Modern Techniques for Evading EDR and AV

Currently trying to Hex Edit an .ACT File for the game Silent Hunter 3

The Ethical Hacker Hunting Predators and Saving Lives Online (Ryan Montg...

Alleged Chinese hacker tied to Silk Typhoon arrested for cyberespionage

redTeamerAtHome

I forgot the password to a .zip file I made years ago. I used an online John the Ripper to get a hash, wtf do I do with the hash now?

Delete Yourself from the Internet: Why You Must—and Exactly How to Do It

How to Use Sudo 1.9.13 Exploit?

Launched my brand Omoro!

100 Stars on My Project Thank You!

How Broken OTPs and Open Endpoints Turned a Dating App Into a Stalker’s Playground

Reverse Engineering Anti-Debugging Techniques (with Nathan Baggs!)

Extract WhatsApp Chats from Desktop

Extract WhatsApp Chats from Desktop

Hacktivists are conservative now?

Risks of a Consoladated Citizen Database. Will it be under constant and sophisticated attacks?

Keygen Ableton 12 Suite

Even secure wallets fail if the terminal is broken

The VPNs and attack boxes of HtB and THM facilitate unrealistic expectations of connectivity. And It's against Terms of Service for any YouTubers to explain the nuances contained in this image that I have ham-fistedly created to help you pop shells (or perhaps now know why you haven't been). Cheers.

Brute force

I extracted 42 zip

Nevada's New Cybersecurity Program

Qantas airline hit by cyberattack, affecting millions

Files Encrypted with .f41abe Extension – No Key Available(Ransomware)

Got my PC infected. He's getting my account passwords.

Yahoo spam mail daily

Someone gained access to my Pinterest account and changed the email