Zayka's Gaming Twitch : Follow her for gaming stuff https://www.twitch.tv/zayka_gamer_girl JOIN OUR DISCORD !: https://discord.gg/wqKQcmK GIT HUB | Source Code https://github.com/SourceCodeDeleted/rootkitdev-linux Source: https://www.youtube.com/watch?v=D3Mo7Z74Hfs Uploader: Source Code Deleted
Topics: Youtube, video, Education, hacking, ethical hacking, hack, hacker, learn hacking, learn ethical...
This is NOT my work. This is something I found in a back up from my old Server. I want to provide content for new people to become involved . It should be noted , that this is NOT reverse engineering like everyone says. This is intro to cracking software. I think for the most part the content doesn't exist on the internet. I think I still have the binaries too, when I find them I will upload them as well. When I find the binaries for practice I will upload them on the first video of this...
Topics: Youtube, video, Education, hacking, hacking tutorial, hacker, hackers, learn hacking, hack, hacking...
The "C= Hacking" newsletter (also known as "C Hacking") was a newsletter that began production in 1992. The main purpose of this newsletter was to show odd programming quirks and tricks on the Commodore 64 and Commodore 128 computers. The name of the newsletter uses the 'C' and '=' sign to form the famous "chicken-head" Commodore logo. This twentieth issue was released on April 18, 2001.
Topics: C= Hacking, C=Hacking, C Hacking
20
20
Oct 27, 2021
10/21
by
Alexander, T. M. (Tracy M.), author
texts
eye 20
favorite 0
comment 0
pages cm
Topics: Hacking -- Fiction, Hacking
We Have A Discord : https://discord.gg/NEjz9r Zayka_Girl does gaming streams https://www.twitch.tv/zayka_gamer_girl GIT HUB | Source Code https://github.com/SourceCodeDeleted/rootkitdev-linux Source: https://www.youtube.com/watch?v=QXj2sYRuk8k Uploader: Source Code Deleted
Topics: Youtube, video, Education, hacking, hack, learn hacking, hacker, ethical hacking, fortnite hacking,...
This aims to be the first in a series of rootkit development. I hate theory so I will move on as soon as possible! Zayka's Gaming Twitch : Follow her for gaming stuff https://www.twitch.tv/zayka_gamer_girl JOIN OUR DISCORD !: https://discord.gg/wqKQcmK GIT HUB | Source Code https://github.com/SourceCodeDeleted/rootkitdev-linux Source: https://www.youtube.com/watch?v=8dZFJEc-8uI Uploader: Source Code Deleted
Topics: Youtube, video, Education, hacking, learn hacking, ethical hacking, hack, russian hacking, why i...
Zayka's Gaming Twitch : Follow her for gaming stuff https://www.twitch.tv/zayka_gamer_girl JOIN OUR DISCORD !: https://discord.gg/wqKQcmK GIT HUB | Source Code https://github.com/SourceCodeDeleted/rootkitdev-linux Source: https://www.youtube.com/watch?v=XJ2w98nRe7Q Uploader: Source Code Deleted
Topics: Youtube, video, Education, hacking, learn hacking, learn ethical hacking for free, hacking course,...
Zayka's Gaming Twitch : Follow her for gaming stuff https://www.twitch.tv/zayka_gamer_girl JOIN OUR DISCORD !: https://discord.gg/wqKQcmK GIT HUB | Source Code https://github.com/SourceCodeDeleted/rootkitdev-linux Source: https://www.youtube.com/watch?v=q5I8B6b-BoY Uploader: Source Code Deleted
Topics: Youtube, video, Education, hacking, ethical hacking, hack, wifi hacking, learn hacking, learn...
JOIN OUR DISCORD!: https://discord.gg/wqKQcmK Zayka's gaming stream Join her army and help the bunnies! https://www.twitch.tv/zayka_gamer_girl GIT HUB | Source Code https://github.com/SourceCodeDeleted/rootkitdev-linux Source: https://www.youtube.com/watch?v=jdPS_qcxS10 Uploader: Source Code Deleted
Topics: Youtube, video, Education, hacking, hack, hacker, learn hacking, mobile hacking, why i quit...
830
830
movies
eye 830
favorite 6
comment 0
penetration testing.
Topic: hacking
Source: torrent:urn:sha1:408a97ebc24b3e6e06e95c382d5769f7b8936588
Paged out, a hacker magazine
Topic: hacking
الجزء الثاني اختبار الاختراق
Topic: hacking
الاختراق الأخلاقي الجزء الأول
Topic: hacking
168
168
data
eye 168
favorite 1
comment 0
Biggest Wordlist Collection
Topic: hacking
1,748
1.7K
software
eye 1,748
favorite 8
comment 0
Black Philes info-library CD-set Black Philes I CD-Rom, 1996-05-07 (3rd Reprint) Black Philes II CD-Rom, 1996-04-02 CD-ROM images made using ClonedCD Black Philes, Information file library for the underground computing scene. [quote] A rare gem, containing a library of text files, mostly related to "underground" subjects, such as hacking, cracking, carding and conspiracy theories, but also general programming and computing topics as well as humor. Meant as bootstrap discs...
Topic: hacking
71
71
audio
eye 71
favorite 0
comment 0
coccoli al silicio puntata numero 1
Topic: hacking
1,797
1.8K
movies
eye 1,797
favorite 0
comment 0
software
Topic: hacking
Source: torrent:urn:sha1:f1d036a0b55d725ad2cfd4af6edf5179538300ce
This Book is written by keeping one object in mind that a beginner, who is not much familiar regarding computer hacking, can easily, attempts these hacks and recognize what we are trying to demonstrate. After Reading this book you will come to recognize that how Hacking is affecting our everyday routine work and can be very hazardous in many fields like bank account hacking etc. Moreover, after carrying out this volume in detail you will be capable of understanding that how a hacker hacks and...
Topic: Hacking
In this video we will hook syscall_read. This is critical thing you must understand for making a Rootkit and interacting with the system calls. Like and Click the bell. Zayka's Gaming Twitch : Follow her for gaming stuff https://www.twitch.tv/zayka_gamer_girl JOIN OUR DISCORD !: https://discord.gg/wqKQcmK GIT HUB | Source Code https://github.com/SourceCodeDeleted/rootkitdev-linux Source: https://www.youtube.com/watch?v=qFA3kFj4uwY Uploader: Source Code Deleted
Topics: Youtube, video, Education, rootkit, hacking, rootkits, ethical hacking, hacker, installing rootkit,...
The Red Team Field Manual (RTFM) Is A No Fluff, But Thorough Reference Guide For Serious Red Team Members Who Routinely Find Themselves On A Mission Without Google Or The Time To Scan Through A Man Page.
Topic: Hacking
The goal of this book is to share the art of hacking with everyone.
Topic: hacking
12
12
Jun 13, 2022
06/22
by
Siddharth Kumar
software
eye 12
favorite 1
comment 0
This is a application for ethical hacker To do hacking with a Android phone This is letest virsion of 2022
Topics: Termux, hacking app, hacker, hacking
The "C= Hacking" newsletter (also known as "C Hacking") was a newsletter that began production in 1992. The main purpose of this newsletter was to show odd programming quirks and tricks on the Commodore 64 and Commodore 128 computers. The name of the newsletter uses the 'C' and '=' sign to form the famous "chicken-head" Commodore logo. This first issue of the magazine came out in 1992, though the exact release date is unclear. The newsletter starts with an apology...
Topics: C Hacking, C= Hacking, C=Hacking, commodore, commodore 64
The "C= Hacking" newsletter (also known as "C Hacking") was a newsletter that began production in 1992. The main purpose of this newsletter was to show odd programming quirks and tricks on the Commodore 64 and Commodore 128 computers. The name of the newsletter uses the 'C' and '=' sign to form the famous "chicken-head" Commodore logo. This thirteenth issue was released in July of 1996.
Topics: commodore, commodore 64, commodore 128, C= Hacking, C=Hacking, C Hacking
The "C= Hacking" newsletter (also known as "C Hacking") was a newsletter that began production in 1992. The main purpose of this newsletter was to show odd programming quirks and tricks on the Commodore 64 and Commodore 128 computers. The name of the newsletter uses the 'C' and '=' sign to form the famous "chicken-head" Commodore logo. This third issue of the magazine came out on July 15, 1992.
Topics: C= Hacking, C Hacking, C=Hacking, commodore, commodore 64, commodore 128
The "C= Hacking" newsletter (also known as "C Hacking") was a newsletter that began production in 1992. The main purpose of this newsletter was to show odd programming quirks and tricks on the Commodore 64 and Commodore 128 computers. The name of the newsletter uses the 'C' and '=' sign to form the famous "chicken-head" Commodore logo.
Topics: C= Hacking, C=Hacking, C Hacking, commodore, commodore 64, commodore 128
The "C= Hacking" newsletter (also known as "C Hacking") was a newsletter that began production in 1992. The main purpose of this newsletter was to show odd programming quirks and tricks on the Commodore 64 and Commodore 128 computers. The name of the newsletter uses the 'C' and '=' sign to form the famous "chicken-head" Commodore logo.
Topics: C= Hacking, C=Hacking, C Hacking, commodore, commodore 64, commodore 128
The "C= Hacking" newsletter (also known as "C Hacking") was a newsletter that began production in 1992. The main purpose of this newsletter was to show odd programming quirks and tricks on the Commodore 64 and Commodore 128 computers. The name of the newsletter uses the 'C' and '=' sign to form the famous "chicken-head" Commodore logo. This seventeenth issue was released on November 15, 1998.
Topics: C= Hacking, C=Hacking, C Hacking, commodore, commodore 64, commodore 128
The "C= Hacking" newsletter (also known as "C Hacking") was a newsletter that began production in 1992. The main purpose of this newsletter was to show odd programming quirks and tricks on the Commodore 64 and Commodore 128 computers. The name of the newsletter uses the 'C' and '=' sign to form the famous "chicken-head" Commodore logo. This tenth issue was released on June 30, 1995.
Topics: commodore, commodore 64, commodore 128, C= Hacking, C=Hacking, C Hacking
The "C= Hacking" newsletter (also known as "C Hacking") was a newsletter that began production in 1992. The main purpose of this newsletter was to show odd programming quirks and tricks on the Commodore 64 and Commodore 128 computers. The name of the newsletter uses the 'C' and '=' sign to form the famous "chicken-head" Commodore logo. This fourteenth issue was released in November of 1996.
Topics: C= Hacking, C Hacking, C=Hacking, commodore, commodore 64, commodore 128
The "C= Hacking" newsletter (also known as "C Hacking") was a newsletter that began production in 1992. The main purpose of this newsletter was to show odd programming quirks and tricks on the Commodore 64 and Commodore 128 computers. The name of the newsletter uses the 'C' and '=' sign to form the famous "chicken-head" Commodore logo. This seventh issue was released in February of 1994.
Topics: commodore, commodore 64, commodore 128, C= Hacking, C=Hacking, C Hacking
The "C= Hacking" newsletter (also known as "C Hacking") was a newsletter that began production in 1992. The main purpose of this newsletter was to show odd programming quirks and tricks on the Commodore 64 and Commodore 128 computers. The name of the newsletter uses the 'C' and '=' sign to form the famous "chicken-head" Commodore logo. This eighth issue was released in August of 1994. It is notable for talking about Commodore's declaration of bankruptcy.
Topics: commodore, commodore 64, commodore 128, C=Hacking, C= Hacking, C Hacking
The "C= Hacking" newsletter (also known as "C Hacking") was a newsletter that began production in 1992. The main purpose of this newsletter was to show odd programming quirks and tricks on the Commodore 64 and Commodore 128 computers. The name of the newsletter uses the 'C' and '=' sign to form the famous "chicken-head" Commodore logo. This twelfth issue was released in March of 1996.
Topics: C Hacking, C=Hacking, C= Hacking, commodore, commodore 64, commodore 128
The "C= Hacking" newsletter (also known as "C Hacking") was a newsletter that began production in 1992. The main purpose of this newsletter was to show odd programming quirks and tricks on the Commodore 64 and Commodore 128 computers. The name of the newsletter uses the 'C' and '=' sign to form the famous "chicken-head" Commodore logo. This sixteenth issue was released in April 26, 1998.
Topics: C= Hacking, C=Hacking, C Hacking, commodore, commodore 64, commodore 128
The "C= Hacking" newsletter (also known as "C Hacking") was a newsletter that began production in 1992. The main purpose of this newsletter was to show odd programming quirks and tricks on the Commodore 64 and Commodore 128 computers. The name of the newsletter uses the 'C' and '=' sign to form the famous "chicken-head" Commodore logo. This eleventh issue was released in December of 1995. It is notable as the original editor Craig Taylor had stepped down. The...
Topics: commodore, commodore 64, commodore 128, C Hacking, C= Hacking, C=Hacking
The "C= Hacking" newsletter (also known as "C Hacking") was a newsletter that began production in 1992. The main purpose of this newsletter was to show odd programming quirks and tricks on the Commodore 64 and Commodore 128 computers. The name of the newsletter uses the 'C' and '=' sign to form the famous "chicken-head" Commodore logo. This twenty-first issue was released on February 5th, 2002. This was apparently the final issue. This newsletter ran from early...
Topics: C= Hacking, C Hacking, C=Hacking, commodore, commodore 64, commodore 128
The "C= Hacking" newsletter (also known as "C Hacking") was a newsletter that began production in 1992. The main purpose of this newsletter was to show odd programming quirks and tricks on the Commodore 64 and Commodore 128 computers. The name of the newsletter uses the 'C' and '=' sign to form the famous "chicken-head" Commodore logo. This second issue of the magazine came out on April 22, 1992
Topics: C Hacking, C= Hacking, C=Hacking, commodore, commodore 64, commodore 128
The "C= Hacking" newsletter (also known as "C Hacking") was a newsletter that began production in 1992. The main purpose of this newsletter was to show odd programming quirks and tricks on the Commodore 64 and Commodore 128 computers. The name of the newsletter uses the 'C' and '=' sign to form the famous "chicken-head" Commodore logo. This eighteenth issue was released on July 3, 1999.
Topics: commodore, commodore 64, commodore 128, C=Hacking, C= Hacking, C Hacking
The "C= Hacking" newsletter (also known as "C Hacking") was a newsletter that began production in 1992. The main purpose of this newsletter was to show odd programming quirks and tricks on the Commodore 64 and Commodore 128 computers. The name of the newsletter uses the 'C' and '=' sign to form the famous "chicken-head" Commodore logo. This fifteenth issue was released in April 1998.
Topics: C= Hacking, C=Hacking, C Hacking, commodore, commodore 64, commodore 128
The "C= Hacking" newsletter (also known as "C Hacking") was a newsletter that began production in 1992. The main purpose of this newsletter was to show odd programming quirks and tricks on the Commodore 64 and Commodore 128 computers. The name of the newsletter uses the 'C' and '=' sign to form the famous "chicken-head" Commodore logo. This ninth issue was released on January 24, 1995.
Topics: C Hacking, C= Hacking, C=Hacking, commodore, commodore 64, commodore 128
34
34
Aug 10, 2018
08/18
by
Soldier of FORTRAN
software
eye 34
favorite 1
comment 0
Deconstructing DeFeNeStRaTe.C slides from Skytalks 2018 talk
Topic: mainframe hacking
858
858
May 20, 2019
05/19
by
Yago Hansen
texts
eye 858
favorite 4
comment 0
Topics: hacking, hardware
A how-to manual for hacking your head.
Topic: mind hacking
189
189
movies
eye 189
favorite 1
comment 0
Udemy - Hacking a dispositivos portatiles - En este curso voy a enseñar varias técnicas de ataque hacia un dispositivo portátil con android, voy a explicar de manera muy detallada con ejemplos prácticos, los diferentes tipos de ataques para que elijas cual de ellos te conviene más a la hora de obtener acceso a los mismos. Tambien compartire diferente herramientas para que puedas realizar las prácticas, uno de los puntos principales va a ser que se va a usar diferentes métodos de ataques...
Topics: hacking, mobiles
1,558
1.6K
movies
eye 1,558
favorite 1
comment 0
Udemy - Hacking Corporativo - Curso Completo - De cero a cien - Este curso no tiene otro objetivo más que retarte y llevar tus habilidades de hacking al siguiente nivel. Va desde lo más básico en conocimientos de ciberseguridad y hacking, pasando por técnicas intermedias y algunas avanzadas en el camino. Aprenderás sobre las herramientas y técnicas utilizadas en el cibercrimen y la forma de pensar de un hacker malicioso. El contenido tan variado y detallado, permite que puedas rellenar...
Topics: Hacking, Corporativo
Usenet newsgroups within "fido7.hacking", contributed courtesy of giganews.com . These captures omit most binary posts.
Topic: fido7.hacking
The "C= Hacking" newsletter (also known as "C Hacking") was a newsletter that began production in 1992. The main purpose of this newsletter was to show odd programming quirks and tricks on the Commodore 64 and Commodore 128 computers. The name of the newsletter uses the 'C' and '=' sign to form the famous "chicken-head" Commodore logo. This nineteenth issue was released on May 29, 2000.
Topics: C= Hacking, C Hacking, C=Hacking, commodore, commodore 64, commodore 128
The "C= Hacking" newsletter (also known as "C Hacking") was a newsletter that began production in 1992. The main purpose of this newsletter was to show odd programming quirks and tricks on the Commodore 64 and Commodore 128 computers. The name of the newsletter uses the 'C' and '=' sign to form the famous "chicken-head" Commodore logo. The fourth issue of this newsletter was produced on October 5, 1992.
Topics: C Hacking, C= Hacking, C=Hacking, commodore, commodore 64, commodore 128