hacking

  1. FaustineSpirit

    📎 smol 📦 misc. Black Philes CD I & II

    Hello 👋 I'm coming to you with another interesting CD, or more precisely, Black Philes CD I & II. These are two compilation CD-ROMs released in the mid-1990s, mainly in 1996, containing huge collections of text files related to the underground computer scene. They were developed by Synchron...
  2. FaustineSpirit

    📎 smol 📦 misc. FIRST CD - Security Tools & Techniques Resource Library - 1994 0.0

    Hello 👋 I come to you with an interesting relic from the past. It is a digital compilation of computer security tools and resources, released in CD-ROM format. It was developed in 1994 by FIRST (Forum of Incident Response and Security Teams), in collaboration with NIST and the U.S. Air Force...
  3. FaustineSpirit

    📎 smol Cracking GSM A5/1 files 0.0

    Welcome 👋 This time I have for you an interesting documentation about the struggles of researchers in breaking the encryption algorithm of the A5/1 family which is used to secure connections and data transmission in GSM networks( Especially in 1-3 generation networks but today we know that...
  4. FaustineSpirit

    📎 smol 🏴‍☠️🖥leaks List of useful resources ...

    Welcome 👋 Below I am throwing you my list of url to sites overflowing with leaked databases, source code, programs, etc. Maybe someone will find it useful. I will try to update this thread to add more interesting sources, if any of you have your own suggestions then let me know;) Please...
  5. Creating dictionaries based on information from OSINT

    Creating dictionaries based on information from OSINT

    I decided to write a small guide on creating effective and personalized dictionaries for cracking passwords based on data from "white intelligence" and knowledge about human nature (called social engineering;)) I think that creating dictionaries is crucial for the effectiveness of password...
  6. Control of users on the network using Evillimiter

    Control of users on the network using Evillimiter

    In this guide, I decided to describe a way to control users in WiFi networks (and not only) using a script with the graceful name Evillimiter. The very operation of this program is not complicated, so I will not dwell here long. On a simple example I will present the use of this program and...
  7. A short guide on social engineering

    A short guide on social engineering

    As Kevin David Mitnick used to say, the key to cracking a password does not have to be a bug or a hole in the operating system, but the design flaw in the human psyche itself, i.e. its weaknesses. In this modest tutorial, I would like to introduce you to the meanders of the psychology of...
  8. ninturez0

    💠 🔞 💿 >100GB 📚 books Higher Intellect / preterhuman.net texts archive 2022-09-02

    Higher Intellect / preterhuman.net texts archive Old school textfile archive with lots of controversial, questionable, and downright bizarre writings Here's a relatively obscure site with a gigantic pile of extremely poorly organized text files. You'll find the usual helping of Anarchist...
  9. ninturez0

    💠  📦 misc. 17 gigabyte script kiddie folder 2022-02-24

    This archive is hosted entirely by third-parties and may not be available now, or in the near/far future. Don't run any executables or scripts in this folder unless you know what you are doing. Use at your own risk. For legal reasons I must tell you that these files are made available for...
/pub/ ~ public channel
Help Users
  • K (Guest) knito:
    what does a strategic intelligence network do
    Quote Link
  • J Chat Bot:
    Guest Johnny 4skin has joined the room.
  • J (Guest) Johnny 4skin:
    it's a network of strategic intel it's self explainatory u dumpass
    Quote Link
  • H Chat Bot:
    Guest hexyeahgaming557261 has joined the room.
  • H (Guest) hexyeahgaming557261:
    how can i post as a guest on threads like archive?
    Quote Link
  • U @ UKnowMe?:
    that's the fun part, you don't (create an account to upload content there!)
    Quote Link
  • P Chat Bot:
    Guest pchngta has joined the room.
  • P (Guest) pchngta:
    where the fuck do i find roms for the jv880
    Quote Link
  • P (Guest) pchngta:
    i was told to look around here but i cant find shit
    Quote Link
  • O @ ObjectPalette:
    I'm back from the dead
    Quote Link
  • S Chat Bot:
    Guest sam5555 has joined the room.
  • S (Guest) sam5555:
    hi
    Quote Link
  • W Chat Bot:
    Guest week has joined the room.
  • W (Guest) week:
    the nnty fun down?
    Quote Link
  • S Chat Bot:
    Guest skiggum has joined the room.
  • S (Guest) skiggum:
    i just noticed that too, pete
    Quote Link
  • U @ UKnowMe?:
    Are resource uploads slow to be shown or moderated? I've uploaded one yesterday but i still can't see it on the thread
    Quote Link
  • A Chat Bot:
    Guest aaa a has joined the room.
  • D Chat Bot:
    Guest dude has joined the room.
  • D (Guest) dude:
    bruh where am I
    Quote Link
  • D (Guest) dude:
    what's this site?
    Quote Link
  • D (Guest) dude:
    it looks cool but I don't really understand what the site about
    Quote Link
  • D (Guest) dude:
    could somebody explain what this forum about
    Quote Link
  • D Chat Bot:
    Guest dksr has joined the room.
  • Xeraser @ Xeraser:
    UKnowMe? said:
    Are resource uploads slow to be shown or moderated? I've uploaded one yesterday but i still can't see it on the thread
    admin has to approve them and he's not here often lately
    Quote Link
      Xeraser @ Xeraser: Are resource uploads slow to be shown or moderated? I've uploaded one yesterday but i still...
      Back
      Top