Even if you harden your server to the most paranoid level, it's always possible that an attacker may sneak past your … [Read More...]
Featured Articles
Setting up your own personal VPN
A VPN lets you access the internet from a network other than your local one. If you've watched Youtube, you've doubtless … [Read More...]
Popular pentesting tools: what they do and how to use them
Pentesting is a huge field, and security audits often require massive investments of time and effort. Performing a … [Read More...]
Editorial Picks
Linux Commands Cheat Sheet
Linux is the software layer on top of the computer hardware and gives the command. Unlike traditional OS such as Windows … [Read More...]
Understanding Google Dorks and How Hackers Use Them
The idea of using Google as a hacking tool or platform certainly isn't novel, and hackers have been leveraging this … [Read More...]
Latest Blog Updates
Clickjacking: a hacker’s guide
Clickjacking helps hackers trick victims into doing things without meaning to. We're going to walk you through the attack step by step using a realistic example. But first, let's start by describing the attack in abstract. So, suppose you want to trick the admin of a site into doing something. Like, say, delete a post on a social media site. Here's the plan: you load the social media site in an iframe. Then you make and iframe invisible. Underneath the iframe, you have fake content that the user will think they're interacting with, when really, they're performing actions in the social media site! Confused? … [Read More...]
Hacker imageboards: guide to underground chans
On imageboards (aka chans), users share text and images anonymously. Thus, their users call themselves "anons". Since anons can post without their real name, many people post content that would otherwise be disallowed or too controversial. This mix of social outcasts and lax rules gave birth to a strong hacker trend you've probably heard of: Anonymous. But even as the era of Anonymous came and past, the chan scene still hosts a lot of unique hacking content and hacker groups. Hacker imageboards are alive and kicking, and we're going to give you a tour. If you already browse imageboards, you likely know about … [Read More...]
What programming languages to learn for hacking?
We've all been there - you want to level up your hacking repertoire, but there are hundreds of exciting new programming languages, and you don't know which one to start with. So what do you do? No need to stress out! We've created this little guide to give you an overview of what languages matter the most for hackers, and why each one is essential, so you don't have to blindly ponder what programming languages to learn for hacking. Coding is a core skill of hacking. It lets you understand the apps you want to break, read their source code to see how they work, and write payloads to exploit other machines. So … [Read More...]
Urbit for hackers
Urbit is a mysterious networking technology that's had the techie underground conflicted for decades. Is Urbit the future of the internet, or a backwater of weirdos too controversial for the normal internet? In this article, we'll ignore all of the politics and focus on the benefits (and drawbacks) of Urbit for hackers. Like any cutting-edge tech, Urbit has unique strengths and weaknesses that hackers can leverage. Urbit's unique architecture makes it ideal for certain hacking tasks, but horrendous for others. Let's start so you can see what I mean! Learn the basics of Urbit for hackers Just like the … [Read More...]
Linux malware: beginner’s guide to avoiding detection
All too often, Linux users indulge in the fantasy that using Linux makes you immune to malware. The fact is, the safety of Linux as a desktop comes largely thanks to its unpopularity, meaning malware devs mostly target Windows (and to a lesser extent, MacOS). Antimalware tech for Linux lacks important features and even basic malware can easily avoid it. If you're a normal person browsing the web with Linux, you don't have anything to worry about. But for servers running large apps, Linux malware always looms as a threat. In this article, we discuss how malware hides in Linux systems, how it blends in with … [Read More...]