Posts

Any tips for discount laundry?

Is anyone else having issues with Google’s VRP team?

hat-based security model

From centralized bug bounties to tokenized security OS: my experience hunting on Immunefi

Having trouble installing Rayhunter on Orbic - First device worked 1st try - Second one gives me login errors

Is there any open source hardware company that sell quality laptops which isn't U.S. made (non-american chips, non-western companies in general.) or should I use old laptops for practice?

Which anti-detect browser do you trust the most for privacy?

AI Supercharges Attacks in Cybercrime's New 'Fifth Wave'

I saw the flipper zero then realised it was 200$, Any solutions?

Kimwolf Botnet Lurking in Corporate, Govt. Networks

Anybody has good experience with windows?

My experience with "anti-detect" browsers and tracking

AI’s Hacking Skills Are Approaching an ‘Inflection Point’

Who Watches The Watchers - P25 Government SDR To The Rescue!

Welp, my friend got hacked.

Maintainer silently patched my GHSA report but is ignoring my request for credit

Going on a cruise what kit should I bring?

AI insiders seek to poison the data that feeds them

Bulletproof Hosting That Allows Port Scanning

Ideas for alternative control

React2shell attack lab

Chisel-ng, complete rewrite of the original golang tool in rust with more features.

StealC hackers hacked as researchers hijack malware control panels

Cybersecurity Firms React to China’s Reported Software Ban

Santa Cruz the First in California to Terminate Its Contract With Flock Safety

how to know breachforums new domains

hacking attack - nightspire

Are we Americans obvious or ignorant?

What's Julian Assange up to lately?

How does one get in touch with actual hackers?

Rate my hacking RPG set in the 1970s!

Fuck Reddit

Dell was actually super helpful for once

I want to create a hacking lab with Kali Linux and windows VMs

Which of these two chips is my BIOS chip?

How many goverment logins do you have?

补天: China's digital defense drills

The islamic regime has cut off the internet and landlines for the past four days. Based on the fact that some of the legitimate websites run in Iran, are accessible through vpns,etc

We Hacked Flock Safety Cameras in under 30 Seconds. - YouTube

After working in cybersecurity SaaS for seven plus years and reaching my wit’s end, I quit my job, moved into my dad’s basement, and published a novel about a guy who uses a Jira ticket to torpedo his employer. My book’s free on Amazon for the next 4 days

What is nexus?

Hacker Deletes White Supremacist Dating App LIVE On Stage and leaks the profiles to okstupid.lol

Doomsday for Cybercriminals — Data Breach of Major Dark Web Forum

How to access a camera feed from a WiFi ear camera

O termux realmente funciona?

Ideal Roadmap for learning hacking

Do modern cellphones still ping towers even when "powered off"?

Hacking Denuvo

Flipper Private Unleashed 2.0 - hands on!

DOOM Running on a Cooking Pot

My personal homage to the golden age of cracking and the BBS demoscene...

Can anyone hack Mobile Dungeons?

I was one of the 91 users affected by the Mintlify token leak — here's what I learned

100k Google Ads Accounts hacked, developing story, discussion open

What do we know about remote signal injection via EMI?

Got this book from University library, is this book any good to learn Networking and become hacker, tho it's Old book from Usa

Career change / UK / Advice

How to prevent STA disassociation when injecting beacon frames with manipulated TIM.

I'm looking for a hacking forum

Don't know if I'm in the right sub, but is there anyway for me to get into my old locked phone?

Is it very difficult to hack Google Drive?

Are proxies even functional anymore in 2026, or have they mostly become security theater?

Sort of stuck

Mobile Dungeons? Hack?

Ble Jammer troubleshooting

What is your hack related EDC?

HardBit 4.0 Ransomware Evolution

Tracking down vin #s

Clone/hack bluetooth headphones

Finding a site!

Assistance with locating a person with a number

Is my cybersecurity project good?

Evilpuppet and evilginx

Blockchain investigator tracking two wallets w huge volume - who controls them?

The Story of a Perfect Exploit Chain: Six Bugs That Looked Harmless Until They Became Pre-Auth RCE in a Security Appliance