Donate to us via Paypal!
Society leans ever heavily on computers, if you have the power to take out computers you can take out society. - cubeman372
Sunday, January 17, 2021
Navigation
Home
 Find:
 Information:
Learn
Communicate
Submit
Shop
Challenges
 Exploit:
 Programming:
 Think:
 Track:
 Patch:
 Other:
 Need Help?
Other
Members Online
Total Online: 88
Guests Online: 87
Members Online: 1

Registered Members: 132603
Newest Member: horlogekorting34
Latest Articles

Articles: HTS Challenge Tutorials

Basic missions 1-10

Walkthrough with hints how to solve basic missions 1-10 on HTS


Passing Real 14

An article written to help people pass Realistic Mission 14. No real spoilers.


Realistic Mission 3

This Tutorial Will Help You On the Poetry Mission.


Realistic Mission 5

This Tutorial Will Help You With The "Damn Telemarketers!" Realistic Mission


Realistic Mission 6

[removed]


real 15

article taken from critical security. there it says that seljojojo wrote it. i guess that's me -_-


Most Read Articles

Selecting Your First Programming Language

Reads: 222973

If you are stuck wondering were to start in your programming adventure this is the article for you.

The Impact of the Gold Rush on Western Society

Reads: 193492

Essay for school on Gold Rush. Not really about western society. Just added "western society" to make it sound more specific. But good Gold Rush info. Please comment. I can expand on it.

Complete Set Of CGI-BIN Exploits and what they do

Reads: 190631

This tutorial will show you many Cgi-Bin exploits out there and tell you what they mean.

Root in Under Five

Reads: 169051

For Schools and Such

Cracking Wep Keys With BackTrack

Reads: 162059

Guide to cracking wep keys for BEGINNERS! By: Exidous

The Tetris Effect

Reads: 139707

A quick overview on a psychological condition known as "The Tetris Effect."

MySQL injection complete tutorial

Reads: 100942

MySQL injection tutorial by sam207... please rate/comment it

Basic 1 to 17

Reads: 91665

This article is for...wait....you got it....BASIC 1 TO 17! This is a :"how-to-" and may contain some spoliers.

Google Hacking

Reads: 88368

Google Hacking

Hydra: Brute-Forcing Passwords (Dictionary Attacks)

Reads: 87818

Brute-Forcing Logins on Remote Services.

Game of Life

Reads: 76917

A small article examining the influence of Conway's Game of Life on the hacker culture.

Camera Hacking with Google

Reads: 74631

This is a list of strings that you could type into google and find a unprotected network camera.Enjoy!

Basic Web Hacking *ALL*

Reads: 74130

A good place to start. Simple instructions for every challenge. *VERY MINOR spoilers*

50 WAYS TO CONFUSE, WORRY, OR JUST SCARE THE PEOPLE IN THE COMPUTER LAB

Reads: 65400

50 WAYS TO CONFUSE, WORRY, OR JUST SCARE THE PEOPLE IN THE COMPUTER LAB. COPIED FROM www.duckshit.com

Introduction to Programming I: Installation

Reads: 56722

Python, Ruby, C, C++ and Java.

Latest Articles

Introduction to Programming I: Installation

Reads: 56722

Python, Ruby, C, C++ and Java.

Complete Anonymity Guide.

Reads: 38233

How to be Anonymous online and more.

PLC Electronic Basics

Reads: 28131

An overview of how electronics play a role in PLC development.

Introduction to PLC

Reads: 26693

Basic overview of a PLC

Using Google Search AJAX API in Python

Reads: 36910

This article hopefully teaches you how to use Google Search AJAX API in Python.

Pen testing 2 walk through

Reads: 31817

a walk through on the pen testing 2

Top 10 Simple Home Security Tips

Reads: 34211

Easy Home Networking Tips!

Pen Testing 2

Reads: 30036

If you need hints because you are still stucked with pen test 2, this article is written for you.

5 Firefox Addons Everyone Should Have

Reads: 34142

Here's a list of Firefox Addons that everyone should have and use.

Realistic 18

Reads: 25661

A guide to help you with the 'insane' realistic 18.

IT Security, a way of life.

Reads: 28959

Offensive Security vs. Defensive Security general questions and answers essay.

WIFI - Part 6, Airodump-ng Part 2

Reads: 40710

This is a pretty thorough guide on everything Airodump-ng. It covers the basics and some of the more advanced features that are part of the tool. This part is about the Airodump-ng Results.

WIFI - Part 6, Airodump-ng Part 1

Reads: 36955

This is a pretty thorough guide on everything Airodump-ng. It covers the basics and some of the more advanced features that are part of the tool. This part is about the Airodump-ng options and syntax.

WIFI - Part 5, OSI and TCP/IP Models

Reads: 29655

This is a quick guide that will help you understand the OSI model and the TCP/IP model. Both are fundamental when dealing with any kind of networking.

WIFI - Part 4, Airmon-ng

Reads: 20463

This is a guide on how to utilize Airmon-ng to be able to place a wireless interface into monitor mode, and be able to successfully use it.