hacking
Ethical hacking & cybersecurity insights
Officer’s Notes pfp

@officercia

In Brazil, two women were filmed stealing money by scanning cards from passersby through a POS terminal… crazy! How do you protect yourself from this? Well... There are various aluminum cardholders that theoretically can help protect against this.
1 reply
1 recast
0 reaction

Kazani pfp

@kazani

🏳 CTF chall write-ups, files & scripts. • CTF is one of the best methods to acquire the necessary skills for hacking various systems or to gain unique knowledge in various aspects of information security. • The link below contains a very useful repo that contains current tools, scripts, platforms and video material on how to complete CTF. Save it to your favorites and use it: ➡️ https://github.com/Crypto-Cat/CTF
0 reply
0 recast
0 reaction

Alfie John pfp

@alfiedotwtf

Walk and talk? I’d prefer crash and burn
0 reply
0 recast
0 reaction

Mikko pfp

@moo

How to read open satellite imagenery https://tech.marksblogg.com/wyvern-open-data-feed.html
0 reply
0 recast
2 reactions

Kazani pfp

@kazani

https://www.verylazytech.com/resources/top-hacking-tools-and-skills-you-need-to-learn-in-2025
0 reply
0 recast
0 reaction

Kazani pfp

@kazani

A New type of web hacking technique: DoubleClickjacking https://www.paulosyibelo.com/2024/12/doubleclickjacking-what.html?m=1
0 reply
0 recast
0 reaction

Josh Ellithorpe pfp

@quest

The backdoors located in backdoors. If you are going to own a machine, make sure you aren't deploying something other hackers can compromise. https://labs.watchtowr.com/more-governments-backdoors-in-your-backdoors/
0 reply
0 recast
2 reactions

Kazani pfp

@kazani

⚙ All in One. Hacking tools. • Hackingtool is a comprehensive hacking tool that includes all the main tools for pentesters and hackers. • The repository has 29.6K stars and is constantly updated. Includes tools from the following categories: - Anonymously Hiding Tools; - Information gathering tools; - Wordlist Generator; - Wireless attack tools; - SQL Injection Tools; - Phishing attack tools; - Web Attack tools; - Post exploitation tools; - Forensic tools; - Payload creation tools; - Exploit framework; - Reverse engineering tools; - DDOS Attack Tools; - Remote Administrator Tools (RAT); - XSS Attack Tools; - Steganograhy tools; - SocialMedia Bruteforce; - Android Hacking tools; - IDN Homograph Attack; - Email Verify tools; - Hash cracking tools; - Wifi Deauthenticate; - SocialMedia Finder; - Payload Injector; - Web crawling; - Mix tools. ➡️ https://github.com/Z4nzu/hackingtool
0 reply
0 recast
4 reactions

Officer’s Notes pfp

@officercia

Dear students 👀, You may not be aware, but Web2 bugs are still hazardous! ☢️ That is why I recommend you pay great attention when hunting for them! https://docs.google.com/document/d/1-_0Wlwch_vtkPM4F-SdEXLjQYaYT7KoPlU2rjt7tkLQ/mobilebasic
0 reply
2 recasts
6 reactions

Officer’s Notes pfp

@officercia

GM! Gaining the most elusive of auditing tips. Add your input and let's collect them all! https://github.com/OffcierCia/tips-solidity-code-auditors
0 reply
8 recasts
7 reactions

Officer’s Notes pfp

@officercia

Auditor’s Notes: ERC20 Integration Tips https://officercia.mirror.xyz/W6V7cWFfK8xuHvezjGL-kyen6c1aJwlvqtwtlpIS53A
0 reply
0 recast
1 reaction