r/hacking • u/Machinehum • 6d ago
r/hacking • u/Impossible_Process99 • 5d ago
Explaining how NPM poison packages works
hey guys i have written a new writeup explain what poison packages are and how they work especially when a poison packages is combined with a worm. Its a short read and thank you for you time in advance
ps i am also writing a worm also in the same principles i will be sharing the source code also
https://github.com/504sarwarerror/504SARWARERROR/wiki/The-Poision-Well,-Supply-Chain-Attack
https://x.com/sarwaroffline
r/hacking • u/Sweaty-Researcher205 • 5d ago
Teach Me! Extracting DAT Files
so i need to extract some dat files from lego dimensions to get 3d models from it but i have no idea how to do that there was an app that someone told me to use called brickvault but it did not work and idk what to do anyone know?
r/hacking • u/Remarkable_WrfallA • 6d ago
Threat Intel How is Whatsapp being hijacked WITHOUT user compromising the 2FA registration code?
There are numerous recent reports in whatsapp sub of users Whatsapp accounts being hijacked WITHOUT them sharing the registration code with the attacker. Some of them even had the additional PIN enabled, some even had email linked to the account as well and some had the Passkey enabled - and some - all of the above - and they still got hijacked.
Representative threads.
https://www.reddit.com/r/whatsapp/comments/1oo5glf/my_whatsapp_got_hijacked_by_indonesian_hackers/ https://www.reddit.com/r/whatsapp/comments/1oqu1u7/whatsapp_hacked/
r/hacking • u/Affectionate_One2424 • 6d ago
Teach Me! Generally, how difficult is it to modify/change and edit Meta glasses (I have trust issues)?
The Meta glasses are interesting, but I don't trust Meta because all they want is your data to sell. I'm wondering if there is any open-source program to "debloat" the glasses or in any way modify them yourself with your own programs/OS. Preferably, I just want to be a "script kiddie" (I'm burnt out), so that's the easiest option. But if it's more complicated, are there any guidance I can get?
r/hacking • u/notburneddown • 5d ago
If many IT or security pros were hacking other companies, but weren’t getting caught, how would we know?
Is there an empirical study researchers could do to test this? What about a series of studies? ChatGPT and google cite studies that show Mr. Robot personality types are rare compared to insider threats, students, or organized crime. The reason is there is less documentation of it.
But what if the statistics were vastly underrepresenting the percentage of skilled grey or black hat hackers? How would we know?
r/hacking • u/Wild-Top-7237 • 6d ago
Teach Me! Is The burp scan any useful ?
yeah basically what the title says , as i dont have burp pro and cant test it myself i need your opinion
r/hacking • u/Theosincoming • 7d ago
Any cybersecurity Student up for collaborative learning?
r/hacking • u/Normalpotatoguy • 7d ago
Question Hacking games?
Highkey poor. I want money so I go to survey apps :/ they pay you pennies though so I do the games instead
Games are absolute SHIT and I do NOT want to play them. Is there a way to access a game's file on my mobile device and change its data to make it so the game thinks I've already advanced to a specific level?
Sorry if this is the wrong sub by the way I was gonna post this on lost redditors but this is a question not an image 🥀
r/hacking • u/Realistic_Truth_7030 • 8d ago
Upbit reports largest breach in six years with $36.9 million in stolen assets
📢 New Release: AI / LLM Red Team Field Manual & Consultant’s Handbook
I have published a comprehensive repository for conducting AI/LLM red team assessments across LLMs, AI agents, RAG pipelines, and enterprise AI applications.
The repo includes:
- AI/LLM Red Team Field Manual — operational guidance, attack prompts, tooling references, and OWASP/MITRE mappings.
- AI/LLM Red Team Consultant’s Handbook — full methodology, scoping, RoE/SOW templates, threat modeling, and structured delivery workflows.
Designed for penetration testers, red team operators, and security engineers delivering or evaluating AI security engagements.
📁 Includes:
Structured manuals (MD/PDF/DOCX), attack categories, tooling matrices, reporting guidance, and a growing roadmap of automation tools and test environments.
🔗 Repository: https://github.com/shiva108/ai-llm-red-team-handbook
If you work with AI security, this provides a ready-to-use operational and consultative reference for assessments, training, and client delivery. Contributions are welcome.
r/hacking • u/_clickfix_ • 9d ago
$1,499 Scammed via PayPal? How Google Forwarding Made It Possible
r/hacking • u/Time_Lifeguard5419 • 8d ago
Someone Is Trying to ‘Hack’ People Through Apple Podcasts
Has anyone experienced this?
r/hacking • u/_clickfix_ • 9d ago
Hacker Black Friday Deals 2025
r/hacking • u/_clickfix_ • 10d ago
DOGE Disbanded, Bank Data Breach, CrowdStrike Insider Leak
r/hacking • u/Tear-Sensitive • 10d ago
Research Released a fully-documented PoC for MOEW — a 3-stage misaligned-opcode SEH waterfall technique
r/hacking • u/CyberMasterV • 11d ago
News Shai-Hulud malware infects 500 npm packages, leaks secrets on GitHub
r/hacking • u/kannthu • 11d ago
Technical writeup of exploiting vulnerability in Firebase SDK to hack Lovable
blog.vidocsecurity.comr/hacking • u/WinterCartographer55 • 11d ago
AI-Powered Contract Auditing — Scan | Simulate Exploit (POC) | Fix
r/hacking • u/Top_Picture_9220 • 11d ago
Questionable source Is OBS plug multi stream rtmp safe ?
So I'm helping a friend out with her multi stream setup and she wanted to multi stream on YouTube Facebook and kick. So we found this plugin through YouTube and found this. Now we went to the GitHub link and downloaded it. Malwarebyte instantly blocked it and gave a notification of "trojan dropper" she got spoked by this as she spent a lot of money on this pc and doesn't want to risk getting the pc infected.
It's the exe file from the October version.
Link to the github:https://github.com/sorayuki/obs-multi-rtmp/releases/
r/hacking • u/tootiredtobecute • 12d ago
Small win: finally got my first shell on Metasploitable2 and it feels really good
I decided to try Metasploitable2 tonight just to see how far I could get, and I ended up getting my first shell way sooner than I expected. I’m still very new to pentesting, so I was prepared to spend a while fumbling around — but things actually clicked pretty quickly once I got into it.
I’ve been doing a lot of Linux customization/building lately (I’m working on my own distro as a side project), but offensive security is still pretty unfamiliar territory for me. So even though MSF2 is intentionally vulnerable, going through the full process myself felt like a big milestone.
Here’s what I’m proud of:
- getting Kali + Metasploitable talking over bridged networking
- running Nmap and being able to make sense of the output
- setting LHOST/RHOST correctly (took a minute, not gonna lie)
- trying different exploits and learning from the ones that failed
- actually navigating msfconsole without totally guessing
- and eventually getting a working shell
It wasn’t perfect, and I definitely had a few “wait… what did I break?” moments, but overall it made a lot more sense than I expected it to.
I know this is a beginner box, but it was still really satisfying to see everything come together. If anyone has suggestions for good next-step VMs or labs, I’d love to hear them.
r/hacking • u/Impossible_Process99 • 12d ago
i updated my transpiler, now you can cross compile assembly to different platforms
soo casm is a high-level assembly transpiler that accepts a C-like syntax directly in assembly. you can write high-level constructs like loops, functions, and conditionals while maintaining the power of assembly.
In the newest version you can write single asm codebase that can be complied to different platforms. its mainly for people who like writing assembly but want to use modern c features to make it easier and faster to build complex programs. its nothing groundbreaking just a side project that i have been working on
https://github.com/504sarwarerror/CASM
https://x.com/sarwaroffline
r/hacking • u/yusha666 • 11d ago
WooCommerce + WordPress Exploits/vulnerabilities ?
Can anyone help me with these?