/archive/
223 subscribers
94 photos
27 videos
88 files
206 links
Cypherpunks do not find comfort in hopes and wishes. They actively interfere with the course of events and shape their own destiny.
Download Telegram
deny_shodan.py
1.4 KB
👍2
/archive/
deny_shodan.py
Script I created to deny every IP from shodan.io of scanning your VPS.
How to Hack Like a Legend.pdf
6.7 MB
Despite the edgy title, this book contains good information
“Know your enemy, know his sword.” wrote Miyamoto Musashi in his book, A Book of Five Rings: The Classic Guide to Strategy. He also wrote, “You win battles by knowing the enemy’s timing, and using a timing which the enemy does not expect.” Although this was written when swords and spears won battles, it also applies to cyberspace, where attacks are launched via keyboards and crafted packets. The more you know about your target’s infrastructure and personnel, the better you can orchestrate your attacks.
👏1
Telegram: How a messenger turned into a cybercrime ecosystem by 2023
https://ke-la.com/wp-content/uploads/2023/02/KELA_Telegram_CEBIN.pdf
😘2🕊1
Forwarded from B R C H Λ N N Ξ L🍌 (Billy)
While researching mobile vendor security, Oversecured found over 130 vulnerabilities in Samsung and ranked top 1 for 2022!

Now I'm describing all the vulnerabilities, and this will be the biggest mobile security article you've ever seen!

https://twitter.com/_bagipro/status/1628032053412519936
This media is not supported in your browser
VIEW IN TELEGRAM
How to become a programmer
😁3
Forwarded from vx-underground
OpenAI performed a great deal of research and risk assessment on GPT-4 prior to it going public. OpenAI has restricted some of its responses based on the tasks performed. See attached images for examples released by OpenAI.

It is very bad.

Information via lukOlejnik
😁5👏1