Posts

🎉 Happy New Year! Here's a Kafka Security Scanner to Celebrate

Microsoft Dynamics 365 Data Exposure: Fetching Your Way to Password Hashes 🔑

Unverified DNS Records to GitHub Pages are Vulnerable

Reddit’s CEO called out all AI companies whose crawlers he said were “a pain in the ass to block,” Tarpitting Nepenthes

US cybersecurity experts plead guilty to BlackCat ransomware attacks

Is it possible to bypass 2FA?

Chipwhisperer/Chipshouter

Built McNeal Protocol: Acoustic encrypted messaging with per-message frequency ratcheting

OWASP says prompt injection is the #1 LLM threat for 2025. What's your strategy?

was this really hacking?

where did everyone go after raidforums was got?

shaha - Hash database builder with reverse lookup. Build rainbow tables from wordlists, query by prefix

Am I a Script Kiddie?

Y’all seen that one lady on TikTok?

Used a Gameboy to get a meterpreter sesh

Cloud‑locked Wi‑Fi camera unusable after ISP change — any workaround?

Tracking an IP address

dashkeep - firmware mod for (nearly) every dashcam

E-ink displays - Comunication protocalls.

Dynamic Pricing

create ephemeral, expendable windows virtual machines for experimentation

Heard of telephony?

I pay for a service

Can't run Fall Guys game in VMware

Are there really “anti-detect” browsers that can’t be tracked - or is it all just mitigation?

evilginx

Some fat Russian fuck stole my fn account but now I have his ip and email and phone number

Yo, wtf I don’t host tail scale: hardware back door?

Coffee survey

Any resources to learn more about satelite/aerospace security?

Hydra confusion

What would it take to build a network of private security cameras to monitor the movement of government vehicles?

Looking through the Epstein files and found pics of his network setup

What would be your ultimate sonic screwdriver?

Subdomain enum

Avoid api limit

ParrotCTF - DO NOT USE

New forums like nulled/breached

How do I build the files to hack things?

Roast my hacking simulator v2.

Should I use online video downloaders?

I'm going to compile a new Linux distribution for my old DVR, but I'm having trouble understanding uBoot!

Flipper Blackhat November Roundup!

PornHub extorted after hackers steal Premium member activity data

Analysis of the Xedni Calculus Attack on Elliptic Curves in Python

Does TikTok limit api uploads to 720p?

How are people securely giving short-term access to sensitive accounts without sharing credentials

Using IP tables to defeat custom ssl and flutter pinning (lil writeup)

Cable nightmares are over

How can someone technically verify whether a third party on the same physical environment (e.g. a nearby neighbor) is attempting to compromise their devices or network, and how should evidence be properly collected?

Where do i find a detailed info ?

Defending against runtime attacks what works?

AI agent beats human hackers in Stanford University's cybersecurity experiment

I have an old DVR device and I'm trying to access it.

How a skilled con artist shook me down for $5,000

Surgery on Chromium Source Code: Replacing DevTools' HTTP Handler With Redis Pub/Sub

Christmas gift ideas

Found this at work. What is this?

I watched someone hack me tonight

I made my own dual purpose tool for development.

I've lost a Zip password

Someone Hacked Paramount's X Account And Brutally Changed Their Bio Over Chummy Relationship With Trump

Chrome Targeted by Active In-the-Wild Exploit Tied to Undisclosed High-Severity Flaw

Gaussian Integers Attack on Sun Microsystems Discrete Log[1991]

i forgor my 5 digits android lock screen password. what program should i use?

I am genuinely curious

What could go wrong?

It's 3am, I am tired from developing... but made a video anyway to show what KaliX-Terminal is.

Terminal LC (any info)

Parrot CTFs

Is it possible to look through people’s gallery ?

i did something wrong😭

What other options are there when all methods of debugging a binary are unsuccessful?

Should I learn the CCNA or network+ curriculum to learn the computer networking part of cybersecurity and bug bounties if I am just starting out?

How (almost) any phone number can be tracked via WhatsApp & Signal – open-source PoC - WhatsApp & Signal Vulnerability

Researchers Uncover 30+ Flaws in AI Coding Tools Enabling Data Theft and RCE Attacks

My Grandpa Lost his Memories and now i have a Xiaomi Tablet without Passwort

How is hacking still possible in 2025?

Hacking tools directory !

Okay, a secure p2p terminal calling