Posts

My uncle told me about a "device for a free, anonymous internet over the air" from the past. What was he talking about?

Email spoofing

Game Of Activy Directory GOAD

gr-linux-crypto, a universal cryptographic module for GNU Radio

Airgeddon selected interface is not a wifi card

Policy, privacy and post-quantum: anonymous credentials for everyone

Bjorn the Cyberviking on the Flipper Blackhat!

When Private Equity buys a company and then outsource IT, do the companies tend to become more vulnerable to hacks?

Dark Covenant 3.0: Controlled Impunity and Russia’s Cybercriminals

Massive Gmail-linked data leak exposes 183 million user credentials

Flipper Blackhat: October Roundup

Making an all in one CLI hacking tool built on top of rust..

Not Just Spies and Saboteurs: Satellite Operators Say Cybercrime Is a Constant Threat

Hacking Formula 1: Accessing Max Verstappen's passport and PII through FIA bugs

Is it possible to see the webshop discount codes?

moodle

Laptop Infested with malware

WIFI Router Assistance

Assistance

How do I retrieve my data

Alternatives to hashmob for .RAR (RAR3-hp) password recovery?

It is possible to hack the password from this BIOS?

​Is a zero-day exploit the only real remaining risk when using public Wi-Fi with fully patched devices and HTTPS?

How to pirate IXL???

Is there any way to access an email that's been deleted?

Hackclub Moonshot

Can we get the Epstein Files released?

How to disable site from knowing when you entered it and when you left it

Weak and Exposed: US Water Utilities a Chinese Hacker Target

Sudden AirTag tracking notifications

What is something else than Osint used to investigate on people?

dnsm - Toolkit for Covert Data Exfiltration via DNS

Reddit write errors, comments disappearing, incident thread

How to stop sites that track how long you are on them?

it is possible to download a docs presentation?

Password recovery

Pi zero 2 w with fenvi ax1800 only shows 2.4ghz and no 5ghz.

Mobile apps suggestions

can anyone give me advice on how to get into my own account i lost?

Future proof password length discussion

This rental had… ESP?

DEF CON 33 - Kill List: Hacking an Assassination Site on the Dark Web - Carl Miller, Chris Monteiro

Cheaper (3rd party) replacement fob compatible with Nice ON4E. Also, can an ON2E be used?

DEF CON 33 - Unmasking the Snitch Puck: IoT surveillance tech in the school bathroom - Reynaldo, nyx

My friend owns a phone where he can only text and call and can't install WhatsApp yet it says he is active on whatsapp how is this and is this phishing/spoofing

Is it possible to hack smart device to avoid subscription?

Easy sim swap exploit - Currently active!

Am I safe from hacking by using a VM?

Hacking in America 2025

Cyberdeck made from a Melodica shell with raspberry pi 5 inside

Best fun/interactive beginner course or series?

Freedom of speech in UK

Hackrf or evilcrow v4 dongle

Team up for CTF?

Is it risky to install Metasploit on my Linux host?

Update on my supply chain tool called raider

How would I go about making a diy badusb that holds multiple payloads?

Automating Recon with AI

Would it be illegal to infect someone's PC with a virus that doesn't harm and isn't malicious?

DEF CON talk on breaking into safe locks used at CVS, Canadian Government, Taco Bell

New mathematical discovery (by me)

Hackers release Qantas customers' data on dark web

Using Hex Editor to try and decipher EKG file for heart measurement.

Feel stuck with learning

What subreddit to use to spread awareness regarding a potential hacking of a third party money app?

A tool that would surface a single "personal info" about targeted persons

DEF CON 29-33 talks updated!

Digital recorder good for 24-48 hours that won’t beep when the battery gets low

Government hacked their own website

Anyone good beginner devices besides the flipper zero?

What would be needed to use existing cell tower/network infrastructure to track drones (re: recent drone "sightings" in the EU)

Best way of plotting 802.11 APs from PcapNG and GPX

soo my side project turned into its own malware dev language

softr.io (HACKED)

How to open a locked Nokia .log file from a Symbian phone (Nokia 5230)

Unwanted network changes by my laptop

Activists raid Scottish security company protecting 'Israeli' weapons factory

Can this card be cloned?

KC Man Indicted for Computer Hacking

reported 2 security issues to Ulanzi 3 days ago

Spoof calling app

Finding location

I built a compiler that lets you write high-level code directly in assembly.

I have been out of the loop for a while now. Should I be worried?

How do I get spam emails

Practical Index Calculus for Computer Programmers: Anomalous Curves

Production Security, Not That Kind

Looking for Smart Contract Hacking material

hosting a hackathon in my server

Trying to edit a save file for NBA 2K Playgrounds 2 (servers shut-off)