You shouldn’t learn hacking, you should learn lots upon lots about what you want to hack and think how to make it do what you want it to i.e give you shell. I would start with networking. There’s awesome book by Don Colton about it, and it’s free.
You shouldn’t learn hacking, you should learn lots upon lots about what you want to hack and think how to make it do what you want it to i.e give you shell. I would start with networking. There’s awesome book by Don Colton about it, and it’s free.
“At The Mountains of Madness”
Does your common relay count? You would need to keep it powered tough.
There’s monocles chat on fdroid, honestly, it’s avesome.
Aside from reverse image search Yandex is wonderful for obscure things like software reverse engineering.
My bet is that there will be a point where only russian cars (looking at UAZ) and cars made for busieness (delivery VANs and buses) would be only ones left.
If you aren’t strictly concerned with having it losless you can check out yt-dlp and download straight from youtube.
yep! I’ve found out browsing hacking/spamming site and i’ve found something too good to be true, it downloaded archive nested inside other archive and in it was silngle .lnk file leading to “the resource”. Peeking inside i’ve found powershell executing base64 (or base32?) encoded script (it’s got commandline option for that. if you want to ask wtf ask microsoft, and tell me), it dl’d some exe from some site and ran it, site was down alredy.
Mastodon i guess.
Just putting all your stuff in one big .7z so you can unpack it to directory then scan them all w/ AV.
http://phrack.org/issues/71/6.html#article here’s the original paper for the intrested.
He didn’t, malware guys use UPX and it’s true that antiviruses scream bloody murder when they see it. It’s also true you can’t see what’s inside unless you have special tools to do so. UPX also has one huge downside, it’s its RAM usage, due to it’s inner workings it’s unable to use optimisations that normal binaries can like page sharing.
Tech? I would really love to join reverse engineering community or two.
They will not because it wouldn’t be profitable to them.
If you log in w/ tor to account you’ve logged it w/o it you deanonymise yourself and it makes no sense.
Was going to suggest this vid too!
Tidal and tidal-dl. You can ask me for stuff.
Grab my hunting knife. Hide it under coat. Call my dogs. Go meet that thing. Knife has to be hidden in case it turns out peaceful like i am. (peaceful is not harmless)
Writing program that use “raw sockets” is fun, like your own ping program.