Hardware Hacking & Circuitry: Part 3: Magnetism, electromagnetism, and induction [Hardware] (2)
Python Meterpreter Persistence in Mac OS [Support] (3)
Rewriting LibC functions in malwares [Malware] (12)
[VulnHub] Troll: 1 - Solution [CTF] (5)
Encrypted Chat: Part II [Programming] (3)
[VulnHub] VulnOS 2 - Solution [CTF] (2)
Like i clearly said...remove my profile/account and all my threads ans info [Linux] (2)
Encrypted Chat: Part I [Programming] (8)
APT write up collection [Operations] (5)
How to forensics a memory image(RAM) to know currently opened urls by browser [Support] (5)
Python Reverse Shell [Support] (12)
Help spoofing X-App-Token of an Android app [Reverse Engineering] (4)
Wordpress has never been safer! [Web Hacking] (20)
ELF process memory injection [Support] (3)
Foxcatcher! [Part 2] - Data Mining [Databases] (6)
Whats the most anonymous active scanning technique? [Reconnaissance] (18)
Gaining Domain Admin from Outside Active Directory [Networking] (6)
LIVE NOW! hangouts + youtube [Social] (12)
Stupid Nix Tricks: SSH Multiplexing [Networking] (12)
Simplified Scraping with Lynx, Regex, and Bash [Linux] (14)
[PHP] File inclusion vulnerability [Web Hacking] (17)
Userland API Monitoring and Code Injection Detection [Malware] (4)
Hacking John Doe ( 2 ) [Social Engineering] (29)
Exploit Mitigation Techniques - Address Space Layout Randomization (ASLR) [Exploit Development] (15)
Ransomware Development ( 2 ) [Malware] (31)
Linux.Cephei: a Nim virus [Malware] (10)
Tutorial: Creating Yara Signatures for Malware Detection [Malware] (3)
Execute malware by opening steganographic image [Malware] (5)
Telugu character how does it works? [Support] (2)
Essay: We Need Hackers Now More Than Ever ( 2 ) [Social] (26)