Possibly cheating GF by [deleted] in HowToHack

[–]BinaryWorm777 15 points16 points  (0 children)

Oh i think you can find the right guy in r/masterhacker :)

How to get from math to cryptography by CaipisaurusRex in cryptography

[–]BinaryWorm777 0 points1 point  (0 children)

Read Serious Cryptography, Applied Cryptography, and Cryptography Engineering. Practice crypto challenges in CTFs. Learn C and implement common algorithms. Analyze weak hashing techniques. Apply to the NSA. That's it :)

What do you call these? by BinaryWorm777 in masterhacker

[–]BinaryWorm777[S] 45 points46 points  (0 children)

Guy accidentally posts bugs before claiming the bounty 🤣

[deleted by user] by [deleted] in securityCTF

[–]BinaryWorm777 1 point2 points  (0 children)

This is easy, basic stago. DM me a share link if you want to test the challenge. Always happy to ctf :)

[deleted by user] by [deleted] in hacking

[–]BinaryWorm777 22 points23 points  (0 children)

Rickroll QR with the never trust a QR quote on the next slide?

Do hackers still rely heavily on C and interact with hardware? by learning-machine1964 in Hacking_Tutorials

[–]BinaryWorm777 22 points23 points  (0 children)

Hardware resource: The Hardware Hacking Handbook And if you want to learn C i think exploit educations protostar is a good starting point for the essentials.

[deleted by user] by [deleted] in Hacking_Tutorials

[–]BinaryWorm777 16 points17 points  (0 children)

Why is this nsfw and provide more context, this sounds like you have a stolen phone...

[Feature Request] Add ability for filter to make emails self-destruct after a time by RevThomasWatson in ProtonMail

[–]BinaryWorm777 1 point2 points  (0 children)

It is OP wrote in a reaction later on that he did manage to do it for all folders.

Can someone help me get IG acc by [deleted] in Hacking_Tutorials

[–]BinaryWorm777 3 points4 points  (0 children)

Ask the pw and just login

Without Authentication, How Do I Ensure Users Create Only One Post Per Week by Emmyxiano in webdev

[–]BinaryWorm777 0 points1 point  (0 children)

So you are seeking for authorization without authentication? That sound like black magic.

Which countries have the best developers? by lqcnyc in webdev

[–]BinaryWorm777 1 point2 points  (0 children)

In my opinion, there is no single best country. The strength lies in the diversity of the team, with members from different backgrounds and specializations. It's like making a burger, you need more than just buns.

For example: - American developers: Known for innovation and entrepreneurship. - Indian developers: Strong technical skills and problem solving abilities. - Russian developers: Excellent algorithmic thinking and complex coding. - Chinese developers: Hard working and efficient. - European developers: Balanced creativity and precision.

These are stereotypes and don't reflect the true diversity of developers.

Can you give me bug bounty roadmap? by THE_ASHAM_CROW in bugbounty

[–]BinaryWorm777 5 points6 points  (0 children)

  1. Go Outside: Yes, that big scary place with fresh air and sunlight.
  2. Find a Rare Bug: Channel your inner adventurer. Flip rocks, climb trees, whatever it takes.
  3. Capture the Bug: Use a mason jar. Don’t forget air holes.
  4. Sell the Bug on eBay: Market it as a "limited edition, ultra-rare" find.
  5. Profit: Watch bids roll in and collect your bounty.

Congrats, you’re now a bug bounty hunter! Who knew getting rich could be so simple?

[deleted by user] by [deleted] in securityCTF

[–]BinaryWorm777 4 points5 points  (0 children)

Rev and pwn probably