Knowledge is Free! [Wiki] (11)
Brute forcing cd keys? [Programming] (8)
Malware Sources [Malware] (3)
Help: cubing negative numbers (php) [Programming] (9)
Like i clearly said...remove my profile/account and all my threads and info [Linux] (12)
Create your own Private Botnet with ProxyDock! [Linux] (13)
Early, unregulated phone access [Phone Hacking] (16)
Windows for The Linux User [Uncategorized] (10)
Mirai Botnet Source Code [Malware] (2)
Nestor10's Malware Analysis 101 - Anatomy of a Trojan Part 1/? [Malware] (7)
Hacking DEFCON Toronto: Galahad - CTF - Part2 [CTF] (2)
[Wifi] The Perfect Suburban Wordlist [Networking] (2)
Forensics Docker [CTF] (2)
A fun game for those who like microcontrollers [Uncategorized] (4)
What do do with a old MacBook Pro? [Hardware] (13)
Mobile Generations and the rise of 5G [Networking] (2)
Let's discuss our favorite tools! [Hardware] (3)
[VulnHub] Basic Pentesting 1 [CTF] (2)
Wine and Ollydbg [Reverse Engineering] (12)
PicoCTF Binary 125: Solution [CTF] (3)
Reversing and Exploiting Dr von Noizemans Nuclear Bomb [Reverse Engineering] (9)
Hardware Hacking & Circuitry: Part 3: Magnetism, electromagnetism, and induction [Hardware] (3)
Rewriting LibC functions in malwares [Malware] (13)
[VulnHub] Troll: 1 - Solution [CTF] (5)
Encrypted Chat: Part II [Programming] (3)
[VulnHub] VulnOS 2 - Solution [CTF] (2)
Like i clearly said...remove my profile/account and all my threads ans info [Linux] (2)
Encrypted Chat: Part I [Programming] (8)
APT write up collection [Operations] (5)
Help spoofing X-App-Token of an Android app [Reverse Engineering] (4)