Posts

Is it risky to install Metasploit on my Linux host?

Update on my supply chain tool called raider

How would I go about making a diy badusb that holds multiple payloads?

Automating Recon with AI

Would it be illegal to infect someone's PC with a virus that doesn't harm and isn't malicious?

DEF CON talk on breaking into safe locks used at CVS, Canadian Government, Taco Bell

New mathematical discovery (by me)

Hackers release Qantas customers' data on dark web

Using Hex Editor to try and decipher EKG file for heart measurement.

Feel stuck with learning

What subreddit to use to spread awareness regarding a potential hacking of a third party money app?

A tool that would surface a single "personal info" about targeted persons

DEF CON 29-33 talks updated!

Digital recorder good for 24-48 hours that won’t beep when the battery gets low

Government hacked their own website

Anyone good beginner devices besides the flipper zero?

What would be needed to use existing cell tower/network infrastructure to track drones (re: recent drone "sightings" in the EU)

Best way of plotting 802.11 APs from PcapNG and GPX

soo my side project turned into its own malware dev language

softr.io (HACKED)

How to open a locked Nokia .log file from a Symbian phone (Nokia 5230)

Unwanted network changes by my laptop

Activists raid Scottish security company protecting 'Israeli' weapons factory

Can this card be cloned?

KC Man Indicted for Computer Hacking

reported 2 security issues to Ulanzi 3 days ago

Spoof calling app

Finding location

I built a compiler that lets you write high-level code directly in assembly.

I have been out of the loop for a while now. Should I be worried?

How do I get spam emails

Practical Index Calculus for Computer Programmers: Anomalous Curves

Production Security, Not That Kind

Looking for Smart Contract Hacking material

hosting a hackathon in my server

Trying to edit a save file for NBA 2K Playgrounds 2 (servers shut-off)

I compiled the fundamentals of the entire subject of Computer and computer science in a deck of playing cards. Check the last image too [OC]

assembly vs c for malware dev

Proton is a security joke for forcing authenticator app 2FA on top of Yubikey

A Comprehensive and Educational Linux Priv. Escalation Tool

$50 Battering RAM Attack Breaks Intel and AMD Cloud Security Protections