chris1102 resteemedbillykeed (65)in #hacking • 7 years agoHuman The Weakest LinkThe short video below might make you rethink how you use computers, mobile and technology. The bad guys got the mad…chris1102 resteemedshitcoinloard (25)in #hacking • 7 years agoEstablishing 'reverse_http' MSF Connections Over Onions (no port forwarding)This solution doesn’t seem to be very well documented and I finally got around to testing it myself, so I’m dropping a…chris1102 resteemedranuganteng (43)in #hacking • 7 years agoCreating the Ideal Setting for Hacking on Mobile Devices@ranuganteng - For whatever reason, you want to set up a mobile device for hacking – or debugging. Search for a device…chris1102 resteemedranuganteng (43)in #hacking • 7 years agodelete postdelete postchris1102 resteemedranuganteng (43)in #hacking • 7 years agodelete postdelete postchris1102 resteemeddhumphrey (61)in #hacking • 7 years agoSocial Engineering - Everything You Need to KnowIn today's world of strong encryption and near-impenetrable software, more and more hackers are turning to social…chris1102 resteemedbobross (38)in #hacking • 7 years agoCIA can see your password! they have been infecting Wi-Fi routers for years: 'Home routers from 10 manufacturers, including Linksys, DLink, and Belkin, allow the CIA to monitor and manipulate incoming and outgoing traffic and infect connected devices.'Leaks and Tools from CIA and NSA keeps popping up on the internet these days. Quite scary what they are capable of…chris1102 resteemedabdelrazek1337 (25)in #technology • 7 years agoHow to Become a HackerMost of us have a strong desire to become a hacker, but really don’t know where to start. If you are in a similar…chris1102 resteemedadnandillawar (29)in #hacking • 7 years agoSouth Korean firm pays $1m to unlock filesIt is believed to be a record amount, although it is worth noting that many ransom payments are never made public.…