Posts

Can someone unlock a list of the 500-1000 most visited websites online?

Wordlist generator based on WordNet graphs + LLM

wordpress memberpress

The Open Source USB Drive Built for Privacy

Hackers: What age did you start? Where did you start, especially in practicing your skills?

How to watch a private video on Youtube?

Can I do anything cool with this network controller?

Micro controller safety?

Flipper Zero (or Alternatives)?

Recent WhatsApp hacks

I wrote an async scanner that runs about 9x faster than nmap for discovery.

Does anyone know if this file is still accessible to download?

High school students organized a Jeopardy CTF competition - give it a try

Official Miasma Poison Tar Pit Docker Image Now Available

Does anybody know where I may stumble upon some Sh1mmer bin downloads

Leader of Ukrainian Hacking Group: GRU Bribed Kyivstar Employee to Hack Company’s Network

Anyone know how to bypass these school laptop pins?

A stealth Playwright (Firefox) version that passes all anti-bot and CAPTCHA

I have a friend who looks like he’s a stalker I’m scared he will know I stalk him

[Tutorial] How to hack DOS games: Reversing Prince of Persia

I built an open-source Burp alternative

HighBoy

How I use Hermes agent to turn Patch Tuesday into Windows exploit research

Face ID bypass with avatar

Hunting the Behavior Behind npm Supply Chain Attacks

Proxmark5 Day 3 Update - $357K+ funded (715% of goal)

Are There Really Ethical Hackers? I've Yet To Meet One

trying to learn patching

Sorry if its the wrong place but

Anyone here familiar with the Internet Computer Protocol (ICP) and why TeamPCP would choose to use it?

Guys, my Telegram was hacked

Hackers Used AI to Develop First Known Zero-Day 2FA Bypass for Mass Exploitation

where is the location of Files by Google on Android?

Hack a data center?

Autonomous Vulnerability Hunting with MCP

AI DNS Resolver

Is it true that the professionals have the worst setups?

I made a rat that controls a pc thru telegram but overnight and all the time it sends this. What shall I do? I've already deleted the script from my pc and moved it to cloud based storage

Refining hacking basics — scaling them aswell

This GBA ROM makes some weird things in the sanbox, would love to understand why

LAB Setup

Ethical malware development community

AI Agents Have a Security Problem. IronClaw is Fixing It.

A hacker ran me over with a robot lawn mower - The Verge

Happened today

Shinyhunters and Canvas

Modify md5sum of a file

OpenCTI founder, Samuel Hassine, arrested and charged for buying child porn / CSAM

Jailbreaking my cars infotainment system and implementing my own custom software

Lilygo T-Embed Glitching etc

Veteran hackers... which era did you prefer hacking in? 🟢 The 1980s 🟣 The 1990s 🔵 The 2000s 🔴 Or today?

Found a possibly interesting live attack

Export/Backup ChatGPT chats

someone else’s UI appearing on screen for split second— possible hacker??

Avoiding rouge AP detection in enterprise networks

San Diego Community College District fighting major cyberattack

[SHOWCASE] Cascavel v3

Pokemon machine

Ip location

built a PE packer where every packed file has a different instruction set – custom VM with randomized opcodes, single C++ file (Want suggestions for future updates past v4)

North Korea rejects US cybercrime claims as 'absurd slander'

is credential stuffing using openbullet2 dead in 2026?

Hacking Wired Analog CCTV cameras going to a DVR (BNC and Coax)

Built a private chat that self-destructs in 24h — no accounts, no logs

Built a private chat that self-destructs in 24h — no accounts, no logs

Small models are better at cost-to-recall than large models like Mythos for vulnerability research

Bluetooth Spoofed Disconnect?

wM-Buster - Flipper Zero app to analyze smart meters for gas, electricity, water. ...