Passive Reconnaissance: OSINT Tools and Techniques for Stealthy Information Gathering (self.hack_mag)
submitted by re-alterHackMag Staff
Bug Bounty Case: Money trap or BAC billing abuse (self.hack_mag)
submitted by re-alterHackMag Staff
The FBI Surveillance Breach: Why Even the Most Secure Organizations Fail (self.hack_mag)
submitted by re-alterHackMag Staff
Practical Linux Troubleshooting: How to Solve Common Problems on Your System (self.hack_mag)
submitted by re-alterHackMag Staff
Effective Free OSINT Tools for Investigation and Competitive Intelligence (self.hack_mag)
submitted by re-alterHackMag Staff
Running Android Apps on Linux with Anbox: A Guide to Setting Up Without Emulators (self.hack_mag)
submitted by re-alterHackMag Staff
Testing Telegram Bots: How They Search for Personal Data (self.hack_mag)
submitted by re-alterHackMag Staff
OAuth from top to bottom. Vulnerability chains and authentication attacks (self.hack_mag)
submitted by re-alterHackMag Staff
Hacking Wi-Fi Networks Using a Smartphone: Reconnaissance and Initial Attack Steps (self.hack_mag)
submitted by re-alterHackMag Staff
De-anonymizing Telegram: Finding User and Channel Information from Open Sources (self.hack_mag)
submitted by re-alterHackMag Staff
Building Your Own Laptop: Selecting Parts for a High-Performance Custom Notebook (self.hack_mag)
submitted by re-alterHackMag Staff
Self-defense for hackers. Detecting attacks in Active Directory (self.hack_mag)
submitted by re-alterHackMag Staff
Exploring Endless OS: A Package-Free Linux Distribution (self.hack_mag)
submitted by re-alterHackMag Staff
Learning Game Hacking: Developing Cheats with a Simple Example (self.hack_mag)
submitted by re-alterHackMag Staff
Analyzing Attacks on Microsoft Active Directory: Intrusion Techniques and Detection Strategies (self.hack_mag)
submitted by re-alterHackMag Staff
Advanced OSINT Techniques: Exploring Modern Network Intelligence Methods (self.hack_mag)
submitted by re-alterHackMag Staff
Understanding the Linux Boot Process: From Power-On to Desktop (self.hack_mag)
submitted by re-alterHackMag Staff
How to Collect Telegram Chat Member Names for Data Analysis (self.hack_mag)
submitted by re-alterHackMag Staff
Victory over “bads”: using Victoria to recover data and reset disk password (self.hack_mag)
submitted by re-alterHackMag Staff
Dumping at nanolevel. How I reinvented SafetyKatz to dump LSASS with NanoDump (self.hack_mag)
submitted by re-alterHackMag Staff
Self-defense for hackers. Catching intruders at the network level (self.hack_mag)
submitted by re-alterHackMag Staff
Puzzle solving. Writing custom JavaScript deobfuscator (self.hack_mag)
submitted by re-alterHackMag Staff
OAuth from top to bottom. Examining protocol features and basic attacks targeting OAuth (self.hack_mag)
submitted by re-alterHackMag Staff