What do do with a old MacBook Pro? [Hardware] (9)
How to forensics a memory image(RAM) to know currently opened urls by browser [Support] (4)
Encrypted Chat: Part I [Programming] (5)
Python Reverse Shell [Support] (11)
Help spoofing X-App-Token of an Android app [Reverse Engineering] (3)
Reversing and Exploiting a Nuclear Bomb ;) [Reverse Engineering] (8)
Wordpress has never been safer! [Web Hacking] (20)
ELF process memory injection [Support] (3)
Foxcatcher! [Part 2] - Data Mining [Databases] (6)
Whats the most anonymous active scanning technique? [Reconnaissance] (17)
Gaining Domain Admin from Outside Active Directory [Networking] (5)
LIVE NOW! hangouts + youtube [Social] (11)
Stupid Nix Tricks: SSH Multiplexing [Networking] (11)
Simplified Scraping with Lynx, Regex, and Bash [Linux] (14)
[PHP] File inclusion vulnerability [Web Hacking] (17)
Userland API Monitoring and Code Injection Detection [Malware] (4)
Hacking John Doe ( 2 ) [Social Engineering] (30)
Exploit Mitigation Techniques - Address Space Layout Randomization (ASLR) [Exploit Development] (15)
Ransomware Development ( 2 ) [Malware] (31)
Linux.Cephei: a Nim virus [Malware] (10)
Tutorial: Creating Yara Signatures for Malware Detection [Malware] (3)
Execute malware by opening steganographic image [Malware] (4)
Telugu character how does it works? [Support] (2)
Essay: We Need Hackers Now More Than Ever ( 2 ) [Social] (26)
Plain Obfuscate Python script as malware [Support] (2)
Help me in cracking this [Support] (1)
Real Penetration Tests: Equalizers and Dirty Tricks [Reconnaissance] (5)
[CrackMe] AikonCWD.01 [Challenges] (6)
[Malware Analysis] Case GBC-17_124: The dropper Part I [Challenges] (7)
C vs C++ for writing malwares [Support] (11)