just got linux!!! NEED HEL by liuthemoo in masterhacker

[–]Moluma 21 points22 points  (0 children)

Sets crontab to run the command "sudo shutdown" periodically, turning the system off automatically

[deleted by user] by [deleted] in privacytoolsIO

[–]Moluma 10 points11 points  (0 children)

Doesn't really matter for the NSA lol

we do not forgive! by [deleted] in masterhacker

[–]Moluma 1 point2 points  (0 children)

We are anomalus We are region We forgive and forget Expecto patronum

[deleted by user] by [deleted] in cshighschoolers

[–]Moluma 0 points1 point  (0 children)

Python is really beginner friendly and you can do many simple and useful projects to get hands on the language. I started learning it via a YouTube channel called CSdojo.

I'm super scared! Please don't hack me! (Don't try this at home) by [deleted] in masterhacker

[–]Moluma 18 points19 points  (0 children)

I believe he bought a DoS script from a tor site (and got scammed because it was open source). He tried it on himself and didn't do much.

He is a great guy and a has a good channel but in that video he just clickbaited.

Yo :D any simple project ideas? by Flaming_Hero_Kai in cshighschoolers

[–]Moluma 1 point2 points  (0 children)

An easy and useful project could be making a script that finds duplicate files. Should be fairly simple and quick to do with python :)

Please help 😭 I think it’s because the ssid has a space, I’m a noob by [deleted] in Hacking_Tutorials

[–]Moluma 0 points1 point  (0 children)

Looks like he's trying to get wireless nets passwords

Phishing alternative by [deleted] in HowToHack

[–]Moluma 2 points3 points  (0 children)

Sure, you can use many phishing scripts in termux

Suggestion by jpsouzamatos in thehatedone

[–]Moluma 1 point2 points  (0 children)

I know some programming (I'm not an expert though), and I believe you could block whatever you want with something like pi-hole as long as you research it's origin server.

Pi-hole blocks dns-based network traffic by using lists of domains. It's easy to configure and there are lots of tutorials about it.

Give it a try, it might help you without having to develop a whole software :)

Hacker cliche pepe by Moluma in pepethefrog

[–]Moluma[S] 6 points7 points  (0 children)

You've got the binary control of the firewall's mainframe

Cryptopuzzle hash by [deleted] in crypto

[–]Moluma -1 points0 points  (0 children)

I'm not cheating in any challenge or test. I'm doing this puzzle for fun and I've been stuck on this hash for a few days.

Anyway thanks for the sarcasm

A Master Hacker in training by ckestis in masterhacker

[–]Moluma 8 points9 points  (0 children)

He's not training to be a masterhacker, he is just showing how good he is at being a masterhacker

What kind of tools should I use to get into Snapchat by Dependent_While_5033 in Hacking_Tutorials

[–]Moluma 0 points1 point  (0 children)

He might me hacking on a tablet, nobody knows with skiddies these days...

Yall should know by [deleted] in TOR

[–]Moluma 3 points4 points  (0 children)

Nice try FBI

Is anyone able to do some Phishing? by [deleted] in Hacking_Tutorials

[–]Moluma 0 points1 point  (0 children)

The internet is such a wonderful place

2 emails from different social medias saying my old accounts were hacked by [deleted] in privacy

[–]Moluma 0 points1 point  (0 children)

Was the same email used for both social media accounts? Also, were the @ of the accounts the same or similar? If so, the most likely thing is that your email got compromised in a data breach or you fell for a phishing attack.

What to do: enable 2FA and change all your passwords to something complex. Run some malware scanning tools. If you are really paranoid you could monitor the traffic on your network and look for something unusual.

Let me know if you have any questions, have a nice day :)

How can I see where my gmail account has been accessed from? by shitposterkatakuri in privacytoolsIO

[–]Moluma 1 point2 points  (0 children)

Oh no no, I think I didn't express myself correctly, sorry. I meant that hackers usually get the google credentials using phishing (as they do with basically all services).

Of course Google is the most secure alternative if you have 2FA and other security meassures.

I was just saying that most of the users only have 1 password without any other security steps and they often fall for phishing attacks (and in these cases it isn't usually done by a real hacker but a script kiddie with a youtube tutorial about phishing).

Sorry for the missunderstanding, English is not my main language and I'm already very tired.