❌

Reading view

There are new articles available, click to refresh the page.

Healthy mind and body of hacker

By: hoek

Yeah, tittle sounds a little like coach, who want to tell (sell) you how to live healthy. As this blog is my personal place, I would like to mix sometimes technical topics with the reflections on life, and tips for other people like me. I got a lot of questions, how to become a hacker, where to find a knowledge, how to develop skills and other

Hackers Are Using Telegram to Spread Malware and Control the System

By: Prakash
Check Point researchers identified more than 130 cyber attacks using a Remote Access Trojan called ToxicEye. This malware is managed by cybercriminals through Telegram messenger app.As per Check Point Research, there is a new trend of attack among cybercriminals, where Telegram is used as a control-and-command system to spread malware even popular application is not installed or is not used, the

Hack Locked Computer using $5 Device (PoisionTap)

By: Prakash
<!--[if gte mso 9]> <![endif]--> If you think that your computer is safe when it is locked with a strong password, then Samy Kamkar’s device PoisionTap will make you wrong. This cheap exploit tool takes just 30 seconds to install a privacy-invading backdoor into your computer. PoisionTap, a tiny $5 Raspberry Pi Zero microcomputer loaded with Node.js code and attached to a

I am not that hacker you are looking for

By: hoek

This article is an information for people who bother me on various groups, social media and messengers. And also for the people who doesn’t understand who am I and what about is this website. It’s not that I don’t like to give a hint or discuss something with someone, but let’s get a few things straight, for the sake of respecting my time and

❌