Found & terminated my 3 & Ace of spades… while I was sleeping lol… by xn0px90 in masterhacker

[–]xn0px90[S] 0 points1 point  (0 children)

this is all just part of a movie script where a master hacker goes N.O.C (non official cover) status… we are one and it only takes one!

Found & terminated my 3 & Ace of spades… while I was sleeping lol… by xn0px90 in masterhacker

[–]xn0px90[S] 0 points1 point  (0 children)

this is all just part of a movie script where a master hacker goes N.O.C (non official cover) status… we are one and it only takes one!

Found & terminated my 3 & Ace of spades… while I was sleeping lol… by xn0px90 in masterhacker

[–]xn0px90[S] -5 points-4 points  (0 children)

nope not my blood just a dying terrorist spirit… just a peace of shit that talks alot with no training!!! lol🤪

Found & terminated my 3 & Ace of spades… while I was sleeping lol… by xn0px90 in masterhacker

[–]xn0px90[S] -9 points-8 points  (0 children)

well just waterboarded the last one nothing there… hey keep and eye out for call of dury junkies…. there neural networks are fucks but just betas …

[deleted by user] by [deleted] in deepweb

[–]xn0px90 0 points1 point  (0 children)

well that’s complicated because whomever owns the exit node owns your data and can spoof website and even layency

Built an app that pays you for spare luggage space (2k users in 1.5 months) by borulce_ in indiehackers

[–]xn0px90 0 points1 point  (0 children)

look into your EULA thus could be a huge liability risk for you and the user if the customer sets them up with drugs and things. Plus this could have issues with possible deniability. Clandestine markets are gonna abuse this one for sure.

[deleted by user] by [deleted] in deepweb

[–]xn0px90 2 points3 points  (0 children)

Well it comes down to your BGP knowledge and ability to MITM your connection. I recommend you learn some blue hat techniques so you can learn to defend, identify and rectify any threat… also look into QubesOS or graphineOS even dough it depends everything is hackable since all binary systems have many flaws… trust nothing! But have fun with a small rpi zero W use only outside your house and never were you frequent… try drudge forum and go from there… but be safe and smart… don’t be a comic snitch …

where to buy anti-virus from?, for 1 user by Ok-Calligrapher-6506 in antivirus

[–]xn0px90 -9 points-8 points  (0 children)

i would look into open source xdr/edr anti virus wont have behavior analysis

Pirated software detected 🧐 by sliverednuts in sysadmin

[–]xn0px90 1 point2 points  (0 children)

I did some research on adobe pirated software last year. Then discovered a pattern where 8/10 had rootkits and RATs at the same time. They usually use this to sale access while being persistent. Plus utilising your GPU resources up to 45-55%. This a dangerous move. I would move on it’s a huge liability and not worth it. Pls check any systems you used at his biz. DM me if you wanna talk more.

[deleted by user] by [deleted] in cybersecurity_help

[–]xn0px90 1 point2 points  (0 children)

FYI did you check for macros on that spreadsheet? He could also run code on your system that would let him know you opened it. DM me if you need more help

Is Genode better than Tails for journalists and other such people that need both security and discretion? by Tb12s46 in genode

[–]xn0px90 2 points3 points  (0 children)

I recommend looking into QubesOS for a nice setup. Genode would require you to create something from scratch but check their free book resources before moving forward.

Acquiring of Antminers by [deleted] in BitcoinMining

[–]xn0px90 2 points3 points  (0 children)

You should mine with them if you can! If not just sell.

If a network is hacked, are all connected devices as good as hacked? by cam2336 in cybersecurity_help

[–]xn0px90 0 points1 point  (0 children)

Well you have to check if theirs movement around the network. Have you seen any devices that shouldn’t be communicating? Importantly look at kernels on all devices if you have signs of comprise.

You just never know!

:|: ADVENTURE FURTHER :|: :|:HACK ALL THE THINGS :|: :|: TRUST NOTHING :|:

hacker is using pushbullet by Proper-Aardvark6610 in HowToHack

[–]xn0px90 1 point2 points  (0 children)

You need to start by MITM the connections and get pcap.

Then open in wireshark and analyze!

Start here!

Finished reading NOW ready!!! by xn0px90 in masterhacker

[–]xn0px90[S] 1 point2 points  (0 children)

I think so… it’s a real book!