Posts

Want to Own my Data, Looking for Opinons

🚀🔥 Evil-Cardputer v1.5.3 - TagTinker ESL 🔥🚀

Bringing back the 80s terminal aesthetic: GLYPHIS_IO BBS, a cyberpunk hacking sim set in alternate 1989 Japan...

Short and easy to understand: "Copy-Fail CVE-2026-31431" What is it and how do I mitigate it with an Open Source Tool

$1 Million in Security

Copy Fail — 732 Bytes to Root

VECT Ransomware Is Actually a Wiper

downloading video that is behind a paywall/subscription

Making clones of gate access key

Weird email, url might have hidden message?

Spoofing failed?

Is there a way to bypass BIOS password without a "system disabled" code from failed attempts?

Anyone familiar with this? What is it?

HTB Voleur Walkthrough | CPTS Preparation

The SOC Analyst Role Is Changing

Facts from the frontline for anyone who wants to poison AI-training web crawlers on a large scale.

Does anyone remember ipstresser.com ? i follow the CASE

Ever wondered how those "weak key" exploits actually work? I made a research tool for it

would this fall under ethical or unethical hacking and where to acquire?

Strange machines showing up in njrat

Protecting your secrets from tomorrow’s quantum risks

Windows bitlocker

I built an open source C2 framework

Is there's a way to access data breaches?

DLL Injection Methods Explained

I built an AI webapp defender that autonomously patches code in response to attacks

If arch has Black Arch and Debian has Kali, does Fedora have a “black hat”

Is this a phishing?

Tool recommendations for vuln/CVE research

did microsoft fix old trick?

Coinbase Quantum Advisory Council Publishes Position Paper on Quantum Computing and Blockchain

How to get into a wifi network without a password

Lab review

Are there examples of any "Good Viruses"?

How Attackers Are Actually Getting In

Command Execution via Drag-and-Drop in Terminal Emulators

[VulnPath Update] New Feature: "My Tech Stack"

Hacking Google Random Number Generator (Part 2)

Vercel confirms breach as hackers claim to be selling stolen data

Before Mythos ruins vulnerability research for everyone. Here is a list all the CVE's I found (with some exploits).

Advice

Someone’s impersonating someone I know on X

Post-Quantum Cryptography Migration at Meta: Framework, Lessons, and Takeaways

Ip grabbers that don’t ask for “consent” before actually grabbing the id? Being blackmailed rn

Claude Opus wrote a Chrome exploit for 2,283

What can one do with an IP adress?

Can y'all tell if this is a scam or nah all other communities don't allow images so can't post there but this looks believable as hell

Defendant Sentenced To 30 Months In Prison For Hacking Betting Website

Malicious MCP Server Proof of Concept

HTB Craft Machine Walkthrough | CPTS Preparation

flashed his d on imo video call

Give it to me straight, can I learn to hack?

Post Quantum Cryptography Just Got a Lot More Urgent

I wrote a header-only indirect syscall library for Windows x64 — zero CRT, zero IAT, 19KB standalone

Spartan Claude and Gandhi Claude take on CTFs

Experimenting with Legacy SIM Cloning (Amena 32k & Movistar 128k) using Huawei E153 - Need some guidance!

Free Zero to Hero Kali Linux courses + PDF's Foundational OPSEC

Can one of you cool guys explain to me the up side to using Linux what exactly Linux is

Not sure if this is the place but

Has anyone ever tried to hack one of these

Hacker Uses Claude and ChatGPT to Breach Multiple Government Agencies

When measuring an AI's security capability - ask which tools it used

Adobe fixes actively exploited Acrobat Reader flaw CVE-2026-34621

Rockstar Games confirms it was hacked by malicious group — 'ShinyHunters' takes credit, gives until April 14 to pay ransom or it will release confidential data

Cyber 2028

Ethical or non ethical?

Someone hacked me with 6.rambler.ru

Thought Virus: Viral Misalignment in Multi-Agent Systems

AIs vs CTFs - Experiment & Surprising Insights

The AI-Assisted Breach of Mexico’s Government Infrastructure

GitHub - momenbasel/htb-writeups: The most comprehensive Hack The Box writeup collection - 500+ machines, 400+ challenges, interactive knowledge graph, skill trees, attack path diagrams, ProLabs, Sherlocks, OSCP/CPTS/CRTO prep. Browse: momenbasel.github.io/htb-writeups

Verified vulnerable web apps on demand via API

Post exploitation techniques

The NaClCON (Salt Con) speaker list is out and it's stacked. May 31–June 2, Carolina Beach NC

I built a 4-agent autonomous security system that runs overnight on a 300€ Android phone — no cloud, no GPU, no API key

How to build an autonomous AI hacker

Can anyone assist me with understanding the workings of this?