Csharp hackers and hardware hackers unite [Hardware] (4)
HackTheBox Weekly Challenge - Waldo [CTF] (11)
New AV Bypass techniques ( 2 ) [Malware] (22)
HackTheBox for Learning Hacking ( 2 ) [CTF] (35)
Tips on being organized and prioritizing stuff? [Social] (8)
Anyone want more Malware? [Malware] (10)
Libssh any vulnerable server (CVE-2018-10933)? ( 2 ) [Exploit Development] (35)
Any recommendation to books/sites to learn malware development? [Support] (4)
[.NET] Performing a MITM attack on the .NETGuard desktop application [Reverse Engineering] (4)
[CVE-2018-11759] Apache mod_jk access control bypass [Web Hacking] (7)
Introducing: A Tor Address for 0x00sec! [0x00sec Announcements] (16)
Robot vulnerabilities, contributing publicly, getting acknowledged and raising the awareness [Hardware] (8)
[CrackMe] CrackMe Simulator 2018 [Challenges] (5)
[Question] ToR nodes and stem library [Support] (5)
VPS domain name NS Routing (hijacking) [Support] (2)
Help with kali Linux [Support] (6)
Essay - Images, Video & Thoughts: Professional Hacker, 2011 to Present [Operations] (20)
Robot Vulnerability Scoring System (RVSS) [Hardware] (6)
Encryption & Bruteforcing [Support] (4)
DLL injection using Ctype in python [Support] (7)
Robotics CTF, a playground for robot hacking [CTF] (3)
How can I learn to form strings in shellcodes? [Exploit Development] (5)
Reflective Dll Injection - Any Way to check If a process is already injected? [Malware] (2)
A basic overview of how drones are build and how they work [Hardware] (4)
Best Residential IP providers nowadays [Support] (3)
A lot about Paging, a little about Virtualization - Part #2 [Hardware] (4)
The VMCS - Part #1 [Hardware] (2)
Introduction: Hardware Virtualization - Part #4294967295 [Hardware] (2)
Are broadcasted SMS still possible? [Phone Hacking] (4)
Realmode Assembly - Writing bootable stuff - Part 7 [Programming] (4)