Activity
Mon
Wed
Fri
Sun
Oct
Nov
Dec
Jan
Feb
Mar
Apr
May
Jun
Jul
Aug
Sep
What is this?
Less
More

Memberships

Anonymous

Public • 2k • Free

38 contributions to Anonymous
Wtf happened to patreon?
What happened to ebola's patreon?
0
0
Is the Quasar rat a safe tool to use?
Is it or not
0
10
New comment Jul 7
0 likes • Jun 17
@Johnny Sins Yo bitch nigga i literally used it to rephrase, I dont know how fucking stupid you are to not understand what rephrasing is but your iq must be negitive fucking 12.
0 likes • Jun 20
@Johnny Sins It was wrong because im still learning and thought it would be a could attempt to show what ive learned so far, didnt know it would be wrong.
Brute force accounts?
Is there a way i can Brute force into a Instagram account
0
9
New comment Jun 25
1 like • Jun 10
Yeah there is and its pretty simple (What im about to tell you is for educational purposes only) Ive personally (hypothetically) brute-forced into a few accounts using my personal favorite kali linux(and windows based) bruteforcer, its called hydra and its very easy to use and install heres a backround about it though, Hydra is a popular tool that supports numerous protocols and services, including HTTP, which can be used to target web-based login forms. It is highly versatile and can be used to perform brute-force attacks against various services, The command fromats are simple and as follows, hydra -l username -P password_list.txt -s 443 -f -V [URL]/login -m FORM:"username=^USER^&password=^PASS^:F=incorrect"
0 likes • Jun 20
@Johnny Sins Shit i knew the method was pretty flawed but i didnt think it was that bad, I'm still learning bro i just put what i thought would be correct and why it would be correct, i appreciate you putting a better response, the whole point of this community is to educate others, It's okay to be wrong as long as you learn from your mistakes because thats how we all learn.
Bypassing filtration.
When utilizing Nmap to scan for open ports, my go-to commands are typically variations like nmap -A, nmap -O, nmap -p, and nmap -p-. However, I've frequently encountered filtered or ignored states for most of the ports, particularly on networks with robust filtration and firewall systems. Despite trying several Metasploit services (although not exhaustively), none have yielded exploitable vulnerabilities, suggesting a high level of network security. Despite this, I'm curious if there are known methods for bypassing such stringent filtration measures, So I can better expand my penetration field's horizon.
3
6
New comment Jun 20
0 likes • Jun 16
@Nop Nop True but not all firewalls are correctly configured therefore theres always a exploitable vulnerability, the systems i was testing on their firewalls were not configured properly and my nmap kept having the reoccurring issue of showing filtration and ignored states when in reality the ports were completely open and vulnerable to exploits.
2 likes • Jun 20
@Apocalypse Warmachine omg im so dumb i completely forgot hping3 was a thing.
First post
Hey guys, I’m new to the cyber world. If anyone would like to network shoot me up💪🏻
1
10
New comment Jun 19
0 likes • Jun 3
@Phoenix You AreNot GettingMy LastName I was agreeing bucko.
0 likes • Jun 17
@Johnny Sins I know what im doing bro, literally ask ai to rephrase a few things and you claim its all chatgpt, how about you use a ai checker before you make assumptions dumb fuck
1-10 of 38
Haker Dude
3
35points to level up
@haker-dude-1157
Mediocre skid and Professional packet sniffer and penetration tester, If you need to find ip's just dm me, (need a valid reason)

Active 9d ago
Joined Apr 27, 2024
powered by