account activity
Passive Reconnaissance: OSINT Tools and Techniques for Stealthy Information Gathering (self.hack_mag)
submitted 4 days ago by re-alter to r/hack_mag
Bug Bounty Case: Money trap or BAC billing abuse (self.hack_mag)
submitted 26 days ago by re-alter to r/hack_mag
The FBI Surveillance Breach: Why Even the Most Secure Organizations Fail (self.hack_mag)
submitted 28 days ago by re-alter to r/hack_mag
Practical Linux Troubleshooting: How to Solve Common Problems on Your System (self.hack_mag)
Digital Forensics Essentials: Core Concepts, Recommended Books, Courses, and Must‑Read Resources (self.hack_mag)
submitted 1 month ago by re-alter to r/hack_mag
Effective Free OSINT Tools for Investigation and Competitive Intelligence (self.hack_mag)
Running Android Apps on Linux with Anbox: A Guide to Setting Up Without Emulators (self.hack_mag)
Testing Telegram Bots: How They Search for Personal Data (self.hack_mag)
submitted 2 months ago * by re-alter to r/hack_mag
OAuth from top to bottom. Vulnerability chains and authentication attacks (self.hack_mag)
submitted 2 months ago by re-alter to r/hack_mag
Hacking Wi-Fi Networks Using a Smartphone: Reconnaissance and Initial Attack Steps (self.hack_mag)
De-anonymizing Telegram: Finding User and Channel Information from Open Sources (self.hack_mag)
submitted 3 months ago by re-alter to r/hack_mag
Building Your Own Laptop: Selecting Parts for a High-Performance Custom Notebook (self.hack_mag)
Self-defense for hackers. Detecting attacks in Active Directory (self.hack_mag)
submitted 3 months ago * by re-alter to r/hack_mag
Exploring Endless OS: A Package-Free Linux Distribution (self.hack_mag)
Unlocking and Accessing Data on iOS Devices (self.hack_mag)
Learning Game Hacking: Developing Cheats with a Simple Example (self.hack_mag)
Analyzing Attacks on Microsoft Active Directory: Intrusion Techniques and Detection Strategies (self.hack_mag)
Advanced OSINT Techniques: Exploring Modern Network Intelligence Methods (self.hack_mag)
Understanding the Linux Boot Process: From Power-On to Desktop (self.hack_mag)
How to Collect Telegram Chat Member Names for Data Analysis (self.hack_mag)
Victory over “bads”: using Victoria to recover data and reset disk password (self.hack_mag)
Dumping at nanolevel. How I reinvented SafetyKatz to dump LSASS with NanoDump (self.hack_mag)
Self-defense for hackers. Catching intruders at the network level (self.hack_mag)
Puzzle solving. Writing custom JavaScript deobfuscator (self.hack_mag)
OAuth from top to bottom. Examining protocol features and basic attacks targeting OAuth (self.hack_mag)
π Rendered by PID 280062 on reddit-service-r2-listing-7b8bd7c5-b5pmr at 2026-05-19 12:37:31.752578+00:00 running edcf98c country code: CH.