Posts

Is this a phishing?

Tool recommendations for vuln/CVE research

did microsoft fix old trick?

Coinbase Quantum Advisory Council Publishes Position Paper on Quantum Computing and Blockchain

How to get into a wifi network without a password

Lab review

Are there examples of any "Good Viruses"?

How Attackers Are Actually Getting In

Command Execution via Drag-and-Drop in Terminal Emulators

[VulnPath Update] New Feature: "My Tech Stack"

Hacking Google Random Number Generator (Part 2)

Vercel confirms breach as hackers claim to be selling stolen data

Before Mythos ruins vulnerability research for everyone. Here is a list all the CVE's I found (with some exploits).

Advice

Someone’s impersonating someone I know on X

Post-Quantum Cryptography Migration at Meta: Framework, Lessons, and Takeaways

Ip grabbers that don’t ask for “consent” before actually grabbing the id? Being blackmailed rn

Claude Opus wrote a Chrome exploit for 2,283

What can one do with an IP adress?

Can y'all tell if this is a scam or nah all other communities don't allow images so can't post there but this looks believable as hell

Defendant Sentenced To 30 Months In Prison For Hacking Betting Website

Malicious MCP Server Proof of Concept

HTB Craft Machine Walkthrough | CPTS Preparation

flashed his d on imo video call

Give it to me straight, can I learn to hack?

Post Quantum Cryptography Just Got a Lot More Urgent

I wrote a header-only indirect syscall library for Windows x64 — zero CRT, zero IAT, 19KB standalone

Spartan Claude and Gandhi Claude take on CTFs

Experimenting with Legacy SIM Cloning (Amena 32k & Movistar 128k) using Huawei E153 - Need some guidance!

Free Zero to Hero Kali Linux courses + PDF's Foundational OPSEC

Can one of you cool guys explain to me the up side to using Linux what exactly Linux is

Not sure if this is the place but

Has anyone ever tried to hack one of these

Hacker Uses Claude and ChatGPT to Breach Multiple Government Agencies

When measuring an AI's security capability - ask which tools it used

Adobe fixes actively exploited Acrobat Reader flaw CVE-2026-34621

Rockstar Games confirms it was hacked by malicious group — 'ShinyHunters' takes credit, gives until April 14 to pay ransom or it will release confidential data

Cyber 2028

Ethical or non ethical?

Someone hacked me with 6.rambler.ru

Thought Virus: Viral Misalignment in Multi-Agent Systems

AIs vs CTFs - Experiment & Surprising Insights

The AI-Assisted Breach of Mexico’s Government Infrastructure

GitHub - momenbasel/htb-writeups: The most comprehensive Hack The Box writeup collection - 500+ machines, 400+ challenges, interactive knowledge graph, skill trees, attack path diagrams, ProLabs, Sherlocks, OSCP/CPTS/CRTO prep. Browse: momenbasel.github.io/htb-writeups

Verified vulnerable web apps on demand via API

Post exploitation techniques

The NaClCON (Salt Con) speaker list is out and it's stacked. May 31–June 2, Carolina Beach NC

I built a 4-agent autonomous security system that runs overnight on a 300€ Android phone — no cloud, no GPU, no API key

How to build an autonomous AI hacker

Can anyone assist me with understanding the workings of this?

University of Toronto researchers devise Rowhammer attack for GPUs. This was until recently only possible for CPUs.

RAT-8000: Remote Access Trojan

Purell ES8 Hand Sanitizer Dispenser

[Tool] VulnPath is now officially live!

Concrete Sequential Thinkers

if a phone call is done on the phone but the person didnt record it is there is any way i can get the record of the phone call (android phone)

i wanna tell you someting

What does the hacking group anonymous do?

Which are the best books to learn about social engineering?

How do responsible disclosure and CVE's work in the IoT space?

How to block clickjacking attacks in iOS browsers?

Check it out!

Which one of you degenerates was it? 😂🤣

Fake recruiter, potential phishing via Zoom?

Cisco removed from the ShinyHunters DLS this morning

Your favorite phishing framework for engagements

Matrix Protocol Forensic Analysis Suite

Can't get textnow sim card to work in unlocked boost mobile phone

Why full-stack post-quantum cryptography cannot wait

Hola, espero no se burlen con esto o estar rompiendo alguna regla de la comunidad. ¿Cómo puedo contactar con alguien que me mando mensaje en Messenger y luego me bloqueó?

My brother is blocking me from my WiFi