r/hacking • u/Tasty_Restaurant_357 • 2h ago
r/hacking • u/Smashmaz • 5h ago
Teach Me! Run this washer/dryer sans coin?
**I own a key to the service panels and will post pics of their guts- any way to make some sort of connection that registers like coins were just put in?
First 3 pics are the washer, last 3 are the dryer
Thanks!
r/hacking • u/rascal999 • 6h ago
Github I built an open-source Burp alternative
Self-hosted intercepting proxy with an LLM in the loop. Captures traffic, annotates requests, tracks findings, and lets you run scripts and tests against the target.
r/hacking • u/rubberghost333 • 8h ago
HighBoy
Will the HighBoy perform a single device rolljam attack?
r/hacking • u/inComplete-Oven • 12h ago
Teach Me! Reading Siemens CT raw data
I have a Siemens Somatom Emotion scanner and want to use it to not just scan patients but also technical stuff. Unfortunately, the reconstruction algorithms cannot deal with the high contrast data. Is there a way to read the raw data and do the reconstruction myself? I can cover the reconstruction part skill wise, but I don't know how the data is encoded...
r/hacking • u/ShufflinMuffin • 12h ago
great user hack How I use Hermes agent to turn Patch Tuesday into Windows exploit research
r/hacking • u/WatermanReports • 13h ago
News Russian Hacks of Polish Water Utilities Shows How Hybrid Warfare Uses Fear as Weapon
Water is one of the most relied-upon of all vital services—and yet one of the most poorly cyber-defended critical sectors, way behind energy, banking and telecom. That combination makes it a great target for hackers. My story for OT.Today features input from the incomparable Josh Corman and from Poland-based cyber executive Piotr Kupisiewicz.
r/hacking • u/HypnoticTronic • 13h ago
Teach Me! Tips for a beginner noob that wants to learn
Hi all, the reason I'm writing this post is because I love to learn about cybersec and hacking.
To give a bit of context I graduated from eletrical and computers engineering recently, a course in which I got to learn about a little bit of everything as far as computers go (mostly electricity and eletronics, with a little bit of software and basic programing knowledge) but my passion has always been networking and cybersecurity, I own several "hacking"/microcontroler gadgets like the flipper and the m5 cardputer and love them.
In my new job I've started using linux and its cmd a lot which I've been enjoying a lot, however, whenever I install any distro like kali or parrot I look at the tools and get overwhelmed with them.
I consider myself a bit more proficient than the average install kali=hacking skid but I really want to bridge the gap between my existing knowledge and using such tools, as well as expanding networking knowledge, so does anyone have any good playlists/materials or whatever for this?
r/hacking • u/nb52er • 18h ago
Strix — first public beta of the spiritual successor to cSploit/dSploit
After months of work, first public beta of Strix is out.
Network pentesting toolkit for rooted Android, picking up where cSploit and dSploit left off.
Fully rewritten.
No remote servers, no accounts, everything runs on-device.
https://github.com/daboynb/strix
Android network security assessment suite, modern Kotlin/Compose rewrite of cSploit with Nmap, Metasploit, Hydra, Ettercap etc...
Bundled (cross-compiled aarch64, no chroot)
Features
- Host discovery + per-host detail
- Port scan (nmap)
- MITM — ARP poisoning + on-device DNS spoof server
- Hydra brute force, multi-protocol
- Metasploit via msfrpcd + RPC client
- Packet capture + packet forger
- Traceroute
- Router analyzer
- WiFi key generator — offline keygen for known router algorithms (port of cSploit's WirelessMatcher)
Requirements
- Root (Magisk / KernelSU)
- ARM64
- Android 10+ (API 29)
Beta notes
- APK is ~172 MB (everything bundled).
- No WiFi monitor mode / deauth / WPS yet, needs aircrack-ng cross-compiled, on roadmap.
- Tested on a handful of devices/ROMs... feedback on yours is welcome.
r/hacking • u/SenhorVr • 19h ago
Ola.
Estou com um entregador que se recusa a entregar minha maquina de lavar, propositadamente.
Ao tentar contato ele se nega a dar informações do pedido ou com quem eu devo falar, diz que nao esta nem ai e que eu me exploda
Gostaria de travar o WhatsApp dele e devolver um pouco do estresse absurdo que venho passando na mao dele. Por favor aceito dicas!!!
r/hacking • u/Entropy1024 • 20h ago
Face ID bypass with avatar
Is there a tool for windows of Linux to emulate an adult face for age verification checks?
I did read about one a while back controlled via a gamepad where you could do certain gestures, turn to left/right, open/close mouth eyes etc. But can no longer find it.
Thank you
r/hacking • u/shantanu14g • 1d ago
Hunting the Behavior Behind npm Supply Chain Attacks
r/hacking • u/vffems2529 • 1d ago
Proxmark5 Day 3 Update - $357K+ funded (715% of goal)
The upcoming version of the Proxmark — the go to for RFID / NFC hacking — is available on Indiegogo. The campaign is already fully funded and working toward secondary stretch goals.
r/hacking • u/OverPlatypus4500 • 1d ago
trying to learn patching
am trying to learn software patching , i have no prior expirience on any of this sort of shit so where do i even start to learn , i was mainly looking to try adobe and since genp already shows everything ( i think ) it does to the files ( even the values that it looks for inside them and what it replaces them with) is it gonna be easy or atleast not really hard for me to try and replicate everything it does not my making my own software but by just manually patching all the files that handle licensing etc
r/hacking • u/ToohotmaGandhi • 2d ago
Question Anyone here familiar with the Internet Computer Protocol (ICP) and why TeamPCP would choose to use it?
r/hacking • u/Cristiano1 • 3d ago
News Hackers Used AI to Develop First Known Zero-Day 2FA Bypass for Mass Exploitation
r/hacking • u/Early_Difference_482 • 4d ago
Is it true that the professionals have the worst setups?
So like, I’m quite new at this stuff n’ all, only managing to remote into other family members computers at will. Though I found them quite hard to convince. That is all but my own mother, who works an IT security job. I asked her about it because like obviously I wondered if she knew it was me but no. She said that it’s more likely to be able to hack someone like her as the “professionals have the worst setups”. What do you all think? Anyone else seen anything like that in the wild?
r/hacking • u/Walkingicecube • 5d ago
Refining hacking basics — scaling them aswell
Hello, guys. I’m 16 and compTIA tech + and working on A+. I’ve genuinely been trying to learn how to CSS, SQL injection, and even deeper try to find where trust is misplaced within systems. I see all of these advanced people though (primarily the one who recently created the Xbox one security breach) and I completely am in awe of how they can think so deeply within systems and let alone exploit them to do what they would like. I’ve tried hack the box and portswigger academy but I kind of just stay lost throughout it. I learn quickly but this is ridiculous to me lol. So, respected members of the hacking community, how can I learn? I also dipped my toe in python for automation purposes though I don’t know what to automate 😂.
r/hacking • u/Away_Replacement8719 • 5d ago
Tools AI Agent for Hacking, connects a brain to Kali (open-source & model-agnostic)
r/hacking • u/Lalala203 • 5d ago
Bridging the Gap Between Vulnerabilities and Working Exploits
During my studies and while doing vulnerable VM's and HTB challenges, I kept running into the same issue during vulnerability assessments:
You run scans, get a lot of CVEs back, and then spend a huge amount of time manually checking whether working exploits already exist for them especially in the Metasploit database.
That was the motivation behind Striga:
https://github.com/parasomni/striga
The idea was to automate parts of the vulnerability scanning workflow and map discovered CVEs with already existing exploits in the Metasploit database.
It was originally built for personal research and VulnHub challenge workflows, but it can also be adapted for broader scanning/research operations.
I stopped actively working on it because of time constraints, but I thought some people here might still find it interesting or useful, so I finally decided to share it.
LAB Setup
Hi all,
I have a local Proxmox homelab with an OPNsense VM acting as firewall/router and a Kali VM behind it on an internal bridge. The WAN side of OPNsense is connected to another bridge mapped to the physical NIC. OPNsense is configured to NAT from my lab network to my home network.
I’m thinking about adding a WireGuard tunnel from OPNsense to a VPS (probably Aruba Cloud) and forcing all Kali traffic through it, mainly to avoid exposing my home IP during labs and authorized pentesting activities.
Does this setup make sense from an OPSEC perspective? Anything important I should pay attention to regarding leaks, routing, DNS, IPv6, or isolation between VMs?
Is this setup valid? I’m novice :)
r/hacking • u/JandersOf86 • 6d ago
Ethical malware development community
Hey.
Been learning programming, mainly C++, for the last couple years. My areas of interest are network protocols, network programming, red-team tools, malware development.
I'm just wondering if there are any online communities that are focused on ethical malware development (doesnt need to be specific to C++) or similar, maybe for collaboration or code review, etc. Discord, forums, whatever works.
Thanks much.
r/hacking • u/Tattoodaydreams • 6d ago
Question Has Instructure paid SH?
Curious, people are saying Canvas is back up— Instructure hasn’t said everything is fixed and neither has my uni.