Posts

Yo, wtf I don’t host tail scale: hardware back door?

Coffee survey

Any resources to learn more about satelite/aerospace security?

Hydra confusion

What would it take to build a network of private security cameras to monitor the movement of government vehicles?

Looking through the Epstein files and found pics of his network setup

What would be your ultimate sonic screwdriver?

Subdomain enum

Avoid api limit

ParrotCTF - DO NOT USE

New forums like nulled/breached

How do I build the files to hack things?

Roast my hacking simulator v2.

Should I use online video downloaders?

I'm going to compile a new Linux distribution for my old DVR, but I'm having trouble understanding uBoot!

Flipper Blackhat November Roundup!

PornHub extorted after hackers steal Premium member activity data

Analysis of the Xedni Calculus Attack on Elliptic Curves in Python

Does TikTok limit api uploads to 720p?

How are people securely giving short-term access to sensitive accounts without sharing credentials

Using IP tables to defeat custom ssl and flutter pinning (lil writeup)

Cable nightmares are over

How can someone technically verify whether a third party on the same physical environment (e.g. a nearby neighbor) is attempting to compromise their devices or network, and how should evidence be properly collected?

Where do i find a detailed info ?

Defending against runtime attacks what works?

AI agent beats human hackers in Stanford University's cybersecurity experiment

I have an old DVR device and I'm trying to access it.

How a skilled con artist shook me down for $5,000

Surgery on Chromium Source Code: Replacing DevTools' HTTP Handler With Redis Pub/Sub

Christmas gift ideas

Found this at work. What is this?

I watched someone hack me tonight

I made my own dual purpose tool for development.

I've lost a Zip password

Someone Hacked Paramount's X Account And Brutally Changed Their Bio Over Chummy Relationship With Trump

Chrome Targeted by Active In-the-Wild Exploit Tied to Undisclosed High-Severity Flaw

Gaussian Integers Attack on Sun Microsystems Discrete Log[1991]

i forgor my 5 digits android lock screen password. what program should i use?

I am genuinely curious

What could go wrong?

It's 3am, I am tired from developing... but made a video anyway to show what KaliX-Terminal is.

Terminal LC (any info)

Parrot CTFs

Is it possible to look through people’s gallery ?

i did something wrong😭

What other options are there when all methods of debugging a binary are unsuccessful?

Should I learn the CCNA or network+ curriculum to learn the computer networking part of cybersecurity and bug bounties if I am just starting out?

How (almost) any phone number can be tracked via WhatsApp & Signal – open-source PoC - WhatsApp & Signal Vulnerability

Researchers Uncover 30+ Flaws in AI Coding Tools Enabling Data Theft and RCE Attacks

My Grandpa Lost his Memories and now i have a Xiaomi Tablet without Passwort

How is hacking still possible in 2025?

Hacking tools directory !

Okay, a secure p2p terminal calling

Any free FRP tool for Samsung?

Unleashed private 2.0

I created a worm module in my modular framework rabids

What OSINT tools you use for different lookups?

An update on Project-Webhunter

What are some different kinds of attacks that targeted ai models?

Critical Security Vulnerability in React Server Components – React

Recommendation of ebooks(free) to learn.

North Korea lures engineers to rent identities in fake IT worker scheme

Look what I found

Can an AC WiFi adapter sniff AX traffic? Question regarding Alfa AWUS036ACM

It looks like the official podcast account of Kiawah Island's local government had been compromised

Hobbyist

Hacking into my refurbished iPad mini

Someone got access to my google photos and i don't know how

How do software licences work