cookie

نحن نستخدم ملفات تعريف الارتباط لتحسين تجربة التصفح الخاصة بك. بالنقر على "قبول الكل"، أنت توافق على استخدام ملفات تعريف الارتباط.

avatar

Hacking courses

Get Free Courses & Shit DCMA => Send email to your mom because we dont care! Now, get out dumb C*nt!

إظهار المزيد
مشاركات الإعلانات
908
المشتركون
-124 ساعات
-17 أيام
-130 أيام

جاري تحميل البيانات...

معدل نمو المشترك

جاري تحميل البيانات...

إظهار الكل...
The FBI Took Down Half The World's "CP" Sites...

Check out

https://guard.io/sog

for a 7 day trial and 20% off your subscription + the ability to protect 5 family members from hackers and scammers! Hello guys and gals, it's me Mutahar again! This time we take a look at how the FBI surveils on it's citizens with a new wave of malware they've been building in secrecy and how civilians get caught in the cross fire (albeit with good intentions) in cyber warfare. This time we take a look at how the FBI used their tools to take down Freedom Hosting and in the process, possibly breaking into the email accounts of most TOR users. Thanks for watching! Like, Comment and Subscribe for more videos!

Hi this is @A_r_e_a_5_1 speaking In recent months i got a lots of pgp signed messages, first of all i am alright and my OPSEC too is alright. In last 2 months my all connected accounts was banned even my deployment server was banned. Even i had lost illegalGPT source code that was the reason why darkweb or CLI version was never launched. But i'll be back on track from next month till then Anything important connect me via session.
إظهار الكل...
👍 3🔥 3
session_string.txt0.00 KB
👍 1
إظهار الكل...
Defcon 32 : $10k Giveaway by Darknet Market Archetyp was a SCAM - Here's Why...

Defcon 32 : $10k Giveaway by Darknet Market Archetyp was a SCAM - Here's Why... The Archetyp darknet market hosted a scavenger hunt at DEFCON 32, one of the most well-known hacking conferences in the world. The event, announced late into the conference, promised a $10,000 prize in Monero for finding three hidden QR codes across Las Vegas, including areas like Caesars Palace, MGM Grand, and the DEFCON 32 venue itself. The challenge seemed exciting at first glance, but in reality, it was a nearly impossible task due to the complexity of the requirements, such as cracking encrypted hashes to locate the codes. Participants had only 24 hours to complete this daunting challenge, which involved searching through a massive area with little guidance. The odds were incredibly low, making it almost certain that no one would win the prize. This led to speculation that the event was more about generating publicity for Archetyp rather than offering a fair contest. The market’s approach to the scavenger hunt raised ethical concerns, as it seemed to exploit participants' time and effort for their gain, without providing any meaningful chance of success. This event also highlighted the complex relationship between DEFCON 32 and law enforcement, as the conference has increasingly become a space where federal agencies are present and involved. The involvement of these agencies in hacking events has caused some unease within the community, adding another layer of controversy to the already contentious scavenger hunt. Overall, the Archetyp scavenger hunt serves as a reminder that not all challenges in the hacking community are as they appear. It's essential to approach such events with caution, keeping in mind the potential for exploitation and the underlying motivations of the organizers. As the community evolves, there is a growing need for transparency, fairness, and ethical considerations in the planning and execution of these events. ☆-----☆-----☆-----☆-----☆ CHAPTERS ☆-----☆-----☆-----☆-----☆ 00:00 Introduction 01:25 Archetype's Role and Responsibility 01:57 Anonymity and Accountability in Darknet 03:16 Archetype's Attempt to Sidestep Blame 04:04 Publicity in Darknet Markets 04:43 Difficulty of the Challenge 06:02 Archetype's Response and the Hurdles 06:17 Technical Complexities and Unrealistic Expectations 07:38 Outcome of the Contest 08:06 Scope of the Scavenger Hunt 10:16 Finding the QR Codes 10:57 Publicity and Buzz Creation 11:27 Mathematical Improbability of Winning 12:15 The Setup and Execution 12:48 Estimating the Participants and Area Covered 13:20 Probability of Finding All QR Codes 15:14 Comparing the Odds and Time Constraints 16:41 Archetype's Earnings and User Base 17:14 Critique of the Challenge and Potential Alternatives 20:04 Archetype's Response and Contradictions 21:34 Lack of Opposition and Security Concerns 24:06 DEF CON's Relationship with Federal Agencies 24:35 Examples of DEF CON's Cooperation with Law Enforcement 30:22 Federal Agencies' Interest and Security Flaws 30:46 The Feds and DEFCON Relationship 31:08 Criticism of Archetype's Lack of Guidance 31:54 Character Analysis of Archetype Admin 32:12 Archetype's Attempt to Shift Blame 33:46 Conclusion and Acknowledgment 28:29 Defcon and Archetype Scavenger Hunt 36:28 Contest Announcement and Duration #darknetmarket #darknet #darkweb ☆-----☆-----☆-----☆-----☆ SOCIAL MEDIA ☆-----☆-----☆-----☆-----☆ PODCAST

https://rss.com/podcasts/darknet/

OFFICIAL WEBSITE:

https://www.doingfedtime.com

FACEBOOK:

https://www.facebook.com/doing.fedtime/

TWITTER:

https://twitter.com/DoingFedTime

LINKEDIN:

https://www.linkedin.com/in/sam-bent/

EMAIL: [email protected] TIKTOK:

https://www.tiktok.com/@doingfedtime

AMAZON AUTHOR PAGE:

https://www.amazon.com/stores/Sam-Bent/author/B0BHX5V81S

Dread: http://dreadytofatroptsdj6io7l3xptbet6onoyno2yv7jicoxknyazubrad.onion/d/doingfedtime Pitch: http://pitchprash4aqilfr7sbmuwve3pnkpylqwxjbj2q5o4szcfeea6d27yd.onion/@doingfedtime ☆-----☆-----☆-----☆-----☆ LEGAL STUFF☆-----☆-----☆-----☆-----☆ The information…

إظهار الكل...
DEF CON 32 - Jake Braun - DEF CON Franklin Project

DEF CON Franklin will infuse research from the hacker community into national security and foreign policy debates. We aim to lift up groundbreaking work happening across villages and deliver this critical research to key policymakers across the globe. Aside from policy work, Franklin will empower individual members of the community to volunteer directly with under-resourced critical infrastructure that support our world. Jacob H Braun Jake Braun served in the White House as Acting Principal Deputy National Cyber Director from May 2023 to July 2024. Prior to joining the White House Office of the National Cyber Director, he was appointed by President Joseph Biden as Senior Counselor to the Secretary of Homeland Security. Braun is also a lecturer at the University of Chicago’s Harris School of Public Policy Studies and Chairman of the Cyber Policy Initiative there. From 2009 to 2011, Braun served as White House Liaison to the U.S. Department of Homeland Security. Braun is also co-founder of the DEF CON Voting Machine Hacking Village (Voting Village) hacker conference.

إظهار الكل...
ThreatActors-TTPs/ALPHV-BlackCat at main · crocodyli/ThreatActors-TTPs

Repository created to share information about tactics, techniques and procedures used by threat actors. Initially with ransomware groups and evolving to other types of threats. - crocodyli/ThreatAc...

إظهار الكل...
How I Hacked Into the World’s Top Universities Including MIT Cambridge & University of Oxford

Just eight months ago, I began studying cybersecurity and ethical hacking. My journey into this world is anything but typical. I was originally studying nursing at university, but it didn’t feel…

Hello world
إظهار الكل...
👍 15🥰 3🗿 3 2🔥 1😎 1
Discover Scilla, a powerful info-gathering tool built in GO! Efficiently perform subdomain enumeration, DNS lookup, port scanning and directory bruteforcing. https://github.com/edoardottt/scilla
إظهار الكل...
GitHub - edoardottt/scilla: Information Gathering tool - DNS / Subdomains / Ports / Directories enumeration

Information Gathering tool - DNS / Subdomains / Ports / Directories enumeration - edoardottt/scilla

🥰 1
اختر خطة مختلفة

تسمح خطتك الحالية بتحليلات لما لا يزيد عن 5 قنوات. للحصول على المزيد، يُرجى اختيار خطة مختلفة.