Forem

# hacking

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
About selling a solution
Cover image for About selling a solution

About selling a solution

7
Comments
2 min read
Cracking GPT Assistants: Extracting Prompts and Associated Files
Cover image for Cracking GPT Assistants: Extracting Prompts and Associated Files

Cracking GPT Assistants: Extracting Prompts and Associated Files

13
Comments 1
1 min read
A Journey into Unseen Threats on our VM
Cover image for A Journey into Unseen Threats on our VM

A Journey into Unseen Threats on our VM

8
Comments
6 min read
picoCTF "GDB Test Drive" Walkthrough
Cover image for picoCTF "GDB Test Drive" Walkthrough

picoCTF "GDB Test Drive" Walkthrough

1
Comments
8 min read
RubberDuck o que é, e como fazer um com o seu Arduino Leonardo (ou com esp32, RP Pico e etc)
Cover image for RubberDuck o que é, e como fazer um com o seu Arduino Leonardo (ou com esp32, RP Pico e etc)

RubberDuck o que é, e como fazer um com o seu Arduino Leonardo (ou com esp32, RP Pico e etc)

27
Comments 1
3 min read
How I transformed my career from software engineer to a penetration tester?

How I transformed my career from software engineer to a penetration tester?

2
Comments
2 min read
Hackeando en 8 bits (y II)

Hackeando en 8 bits (y II)

Comments
7 min read
Unveiling the XZ Backdoor: A Deep Dive into the Shocking Supply Chain Attack
Cover image for Unveiling the XZ Backdoor: A Deep Dive into the Shocking Supply Chain Attack

Unveiling the XZ Backdoor: A Deep Dive into the Shocking Supply Chain Attack

6
Comments 1
3 min read
Downgrade your android device to android 10

Downgrade your android device to android 10

1
Comments 1
2 min read
Install Kali NetHunter On Your Android Device

Install Kali NetHunter On Your Android Device

56
Comments 1
3 min read
Common Security Vulnerabilities in the Blockchain World
Cover image for Common Security Vulnerabilities in the Blockchain World

Common Security Vulnerabilities in the Blockchain World

1
Comments
4 min read
Solving Pickle Rick: An Online CTF Challenge on TryHackMe
Cover image for Solving Pickle Rick: An Online CTF Challenge on TryHackMe

Solving Pickle Rick: An Online CTF Challenge on TryHackMe

Comments
6 min read
WiFi Hacking + ESP32 = WIFI32: A wireless security tool.
Cover image for WiFi Hacking + ESP32 = WIFI32: A wireless security tool.

WiFi Hacking + ESP32 = WIFI32: A wireless security tool.

8
Comments
1 min read
Build Your First Password Cracker
Cover image for Build Your First Password Cracker

Build Your First Password Cracker

22
Comments
5 min read
Otimizando Wordlists para Pentests
Cover image for Otimizando Wordlists para Pentests

Otimizando Wordlists para Pentests

13
Comments
7 min read
Common Password Cracking Techniques For 2024
Cover image for Common Password Cracking Techniques For 2024

Common Password Cracking Techniques For 2024

9
Comments
5 min read
Building a Simple Spy Camera with Python
Cover image for Building a Simple Spy Camera with Python

Building a Simple Spy Camera with Python

17
Comments 6
5 min read
Hackeando en 8 bits
Cover image for Hackeando en 8 bits

Hackeando en 8 bits

1
Comments 2
5 min read
What is Information Security Threats

What is Information Security Threats

Comments
2 min read
Dorking of Google
Cover image for Dorking of Google

Dorking of Google

Comments
2 min read
Five Ways Your CI/CD Pipeline Can Be Exploited
Cover image for Five Ways Your CI/CD Pipeline Can Be Exploited

Five Ways Your CI/CD Pipeline Can Be Exploited

2
Comments
5 min read
Terrapin SSH Attack: An Overview
Cover image for Terrapin SSH Attack: An Overview

Terrapin SSH Attack: An Overview

Comments
3 min read
NixOS on Raspberry Pi 4 with Encrypted Filesystem

NixOS on Raspberry Pi 4 with Encrypted Filesystem

1
Comments
6 min read
Protect your online Browsing or business with KASM. This video is for Educational purposes!

Protect your online Browsing or business with KASM. This video is for Educational purposes!

Comments
1 min read
Hashcat vs John the Ripper: A comparative benchmarking of password cracking tools 🚀
Cover image for Hashcat vs John the Ripper: A comparative benchmarking of password cracking tools 🚀

Hashcat vs John the Ripper: A comparative benchmarking of password cracking tools 🚀

27
Comments 3
9 min read
loading...