Activity
Mon
Wed
Fri
Sun
Jan
Feb
Mar
Apr
May
Jun
Jul
Aug
Sep
Oct
Nov
Dec
What is this?
Less
More

Memberships

Anonymous

Public • 2k • Free

5 contributions to Anonymous
something to spam processes in Realtime
i need something that will spam processes to take up all the cpu preferably with Realtime permission but its ok if not (educational purposes only)
0
10
New comment Jun 19
0 likes • Jun 15
A fork bomb is what you're looking for.
Bypassing filtration.
When utilizing Nmap to scan for open ports, my go-to commands are typically variations like nmap -A, nmap -O, nmap -p, and nmap -p-. However, I've frequently encountered filtered or ignored states for most of the ports, particularly on networks with robust filtration and firewall systems. Despite trying several Metasploit services (although not exhaustively), none have yielded exploitable vulnerabilities, suggesting a high level of network security. Despite this, I'm curious if there are known methods for bypassing such stringent filtration measures, So I can better expand my penetration field's horizon.
3
6
New comment Jun 20
0 likes • Jun 15
If the firewall is configured correctly, you can't do much.
Why is RSA far more used than ECC even though ECC is more secure with the same key size?
I don't get it. Why is ECC not used more than RSA if it is more secure, faster, and uses fewer server resources?
0
4
New comment Jun 15
0 likes • Jun 15
@Idan Code - ECC is a more complicated and tricky to implement securely than RSA. This is not necessarily a problem is you use proven cryptographic libraries from trusted vendors. - Signing with a broken random number generator compromises the signer's private key. Signing two times with the same random number directly reveals signer's private key. Some signature schemes avoid randomness and has no such potential problem (e.g. deterministic ECDSA). - Not all standardised curves are considered secure. You should know how to select a strong curve for your ECC calculations. Source: https://github.com/nakov/practical-cryptography-for-developers-book
whats the best discord free rat tool to use?
for educaltional purposes ofcourse but can someone tell me please?
0
6
New comment Jun 16
0 likes • Jun 15
@Idan Code ... high quality RATs are not written in Python nor do they use Discord for CNC communication. Using Discord bots for CNC was an interesting proof of concept 6 years ago but horrible in terms of real world usage
Help me with decryption of repeating key XOR
I am experiencing issue in a XOR challenge which involves an key size = "4" and cipher text - "585047514a594644066c544202404068065b00685a004a4a" and it's given that desc. - "what happens if an XOR key is shorter than the actual ciphertext" #coding #general 1. the key is repeated 2. Key size is 4 3. make a sample key as said by admin
0
6
New comment Jun 16
0 likes • Jun 15
@Haker Dude What is that ChatGPT shittie response. Not only is that lazy asf but the answer is also incorrect LOL @Abhinav Kumar I've attached the real solution, written and solved by an actual human. And I'm sorry for the late response. You've probably already solved it or it's too late to submit, idk. I wanted to comment a week ago, but I wasn't granted access to write comments until 2 days ago.
1-5 of 5
Nop Nop
1
4points to level up
@nop-nop-3821
binwiz

Active 1d ago
Joined Jun 13, 2024
kernel
powered by