Hello guest, if you read this it means you are not registered. Click here to register in a few simple steps, you will enjoy all features of our Forum.
Rules have been updated! Here

Tags
Author: adi - Replies: 0 - Views: 8249
Hacker Allegedly Hijacked Phone Numbers and Stole Millions of Dollars Worth of Crypto
Back on July 12th in California, a college student was arrested for being a participant in a group of crooks that allegedly hacked numerous cell phone numbers and stole over $5 million in Bitcoin and other cryptocurrencies.

With the assistance of his unnamed collaborators, 20-year-old Joel from Boston, MS hacked around 40 victims.

This was actually the very first case ever reported from individuals using SIM hijacking or SIM swapping, a technique that has been gaining popularity, to allege
Author: MaskedUser - Replies: 10 - Views: 10235
Basic Steps of Hacker or Ethical Hacker
1. Scanning Open Ports , Misconfig in Web App etc etc

2. Checking Vulnerabilities via Vulnerabilities Scanner

3 . Gaining Access Exploiting Vulnerabilities

4. Maintaining Access via FUD Malware

5 . Clearning Tracks / Logs to be Anonymous.

The most Important thing is to Be Anonymous in all these Activities which itself is a crime according to Cyber Laws.
How to be Anonymous :

Pre Activitity before trying all of them is to change mac address / Identity of Network Interface Card
Author: Bl4ckCyb3rEnigm4 - Replies: 0 - Views: 138
Resource Hacker
[Image: https://i.imgur.com/4oKrhmS.png]

Resource HackerTM is a resource editor for 32bit and 64bit Windows® applications. It's both a resource compiler (for *.rc files), and a decompiler - enabling viewing and editing of resources in executables (*.exe; *.dll; *.scr; etc) and compiled resource libraries (*.res, *.mui). While Resource Hacker is primarily a GUI application, it also provides many options for compiling and decompiling resources from the command-line.
Compiling
Compiling ca