jump to content
my subs
AntiwarAskSaidItbitcoinbookscensorshipCollusioncomedyComedyMusicComicsconspiracycorruptioncryptocurrencyDecentralizeAllThingsDocumentariesdogecoinDownTheMemoryHoledreamsEarthEntertainmentenvironmentEuropefinancefunnyGaminggifshelphistoryInternetIntroductionsLateStageCapitalismLinuxmapsMeanwhileOnRedditMeanwhileOnVoatMediaAnalysismemesMoviesmusicMusicVideosnewsNotTheOnionoffbeatPhysicspicspiracyPoliceMisconductpoliticsProgrammerHumorprogrammingpropagandaquotesRothschildsSaidItSaiditCanaryScienceFictionSocialMediaspaceTechCompaniestechnologyTechSecTILvideosWarWatchWatchRedditDiewhateverWikiLeaksWorldNewsWorldPoliticsedit subscriptionsfind popular subsfind new subs
  • subscribed
  • -all
  • -random
- more »
Hacking Hacking
  • hot
  • new
  • insightful
  • fun
  • top
  • comments
Want to join? Log in or sign up in seconds.|
  • lights off
  • |English

use the following search parameters to narrow your results:

subreddit:sub
find submissions in "sub"
author:username
find submissions by "username"
site:example.com
find submissions from "example.com"
url:text
search for "text" in url
selftext:text
search for "text" in self post contents
self:yes (or self:no)
include (or exclude) self posts

e.g. subreddit:pics site:imgur.com dog

advanced search: by author, sub...

Submit a new link
Submit a new text post

Hacking

subscribeunsubscribe8,282 readers

~1 user here now

Discussions of hacks.
How to hack.
How to protect.
False flags, hoaxes (like wikileaks).
Stay legal.

created by zyxzevna community for 3 years
message the moderators

MODERATORS

  • zyxzevn
  • moderation team • moderation log

1
-

How YouTubers Are Getting Hacked

submitted 3 days ago by zyxzevn from youtube.com

  • comment
loading...

2
-

eevBLAB 109 - Ebay Test Equipment SCAM

submitted 6 days ago by zyxzevn from bitchute.com

  • comment
loading...

1
-

Hackers exploiting two-year-old VMware flaw to launch large-scale ransomware campaign

submitted 1 month ago by neolib from techcrunch.com

  • comment
loading...

1
-

Julius ‘zeekill’ Kivimäki, former Lizard Squad hacker, arrested in France - He was being sought as part of an investigation into a cyberattack targeting Vastaamo, a Helsinki-based private psychotherapy center, that was made public in 2020

submitted 1 month ago by neolib from therecord.media

  • 1 comment
loading...

3
-

‘We hacked the hackers:’ DOJ, FBI take down Hive ransomware after spending months inside gang systems

submitted 1 month ago by neolib from therecord.media

  • comment
loading...

1
-

Lasers Can "Hack" Self-Driving LiDAR Sensors, Creating False "Blind Spots", New Study Reveals

submitted 4 months ago by zyxzevn from zerohedge.com

  • comment
loading...

1
-

Kali NetHunter WiFi Hacking (quick example)

submitted 4 months ago by zyxzevn from youtube.com

  • comment
loading...

2
-

Amazon SES Console Admin Available

submitted 4 months ago by Alex123 from self.Hacking

  • comment
loading...

2
-

Critical Remote Code Execution Vulnerability in JXPath Library (CVE-2022-41852)

submitted 5 months ago by majk from hackinglab.cz

  • comment
loading...

2
-

Cybercrime in Hollywood: Why hacking is portrayed more accurately than you think

submitted 5 months ago by TheRealPanzer from lacework.com

  • comment
loading...

1
-

Interview with Tina Peters, star of Selection Code (Explaining the procedural frauds in the last election)

submitted 5 months ago by zyxzevn from rumble.com

  • comment
loading...

1
1

PETEP (Open-Source TCP Proxy for Hacking)

submitted 6 months ago by majk from self.Hacking

  • comment
loading...

2
-

Hacker shows why TSA is “security theater” | Evan Booth for Heretics (5:00) ~ Freethink

submitted 6 months ago by JasonCarswell from youtube.com

  • comment
loading...

2
-

LastPass developer systems hacked to steal source code

submitted 6 months ago by zyxzevn from bleepingcomputer.com

  • comment
loading...

7
4

The new USB Rubber Ducky is more dangerous than ever

submitted 7 months ago by TheRealPanzer from archive.ph

  • comment
loading...

4
1

Hacker Finds Kill Switch for Submachine Gun–Wielding Robot Dog

submitted 7 months ago by TheRealPanzer from archive.ph

  • 1 comment
loading...

3
-

Did you know most Hollywood hacking scenes are actually just actors running basic terminal commands

submitted 7 months ago by TheRealPanzer from twitter.com

  • comment
loading...

3
-

Symbiote Deep-Dive: Analysis of a New, Nearly-Impossible-to-Detect Linux Threat

submitted 9 months ago by zyxzevn from intezer.com

  • 1 comment
loading...

3
1

Interview with a real hacker: "There is no making it secure!" - The Hated One

submitted 10 months ago by zyxzevn from youtube.com

  • comment
loading...

6
1

Breaking RSA - Computerphile

submitted 10 months ago by zyxzevn from youtube.com

  • comment
loading...

1
-

Internal AWS credentials swiped by researcher via SQL payload

submitted 11 months ago by zyxzevn from portswigger.net

  • comment
loading...

2
-

Microsoft "Investigating" Potential Breach Of Internal Systems By Group Known For Demanding Bizarre Ransom

submitted 12 months ago by zyxzevn from zerohedge.com

  • 1 comment
loading...

1
-

The Statue That Started A Cyberwar - The Hated One

submitted 1 year ago by zyxzevn from youtube.com

  • comment
loading...

4
-

These Companies Can Legally Hack You - The Hated One

submitted 1 year ago by zyxzevn from youtube.com

  • comment
loading...

3
1

Apple Sues Israeli Spyware Firm, Begins Notifying Victims Of State-Sponsored iPhone Hacks

submitted 1 year ago by zyxzevn from zerohedge.com

  • 1 comment
loading...

2
1

IoT Hacking and Rickrolling My High School District

submitted 1 year ago by zyxzevn from whitehoodhacker.net

  • comment
loading...

1
-

Zoom RCE from Pwn2Own 2021

submitted 1 year ago by zyxzevn from sector7.computest.nl

  • comment
loading...

1
-

HACKED: The CODE RED Buffer Overflow - How it Worked! [Dave's Garage]

submitted 1 year ago by zyxzevn from youtube.com

  • comment
loading...

3
1

Hackers Didn't Shut Down The Colonial Pipe Line, But CEO Did?

submitted 1 year ago by zyxzevn from youtube.com

  • comment
loading...

2
-

Bitcoin is under attack with Whitney Webb #251 [TFTC] (The bankers already have a plan for electric currency with CIA surveillance)

submitted 1 year ago by zyxzevn from youtube.com

  • comment
loading...

1
-

Use the Deauther Watch Wi-Fi Hacking Wearable [Tutorial]

submitted 1 year ago by zyxzevn from youtube.com

  • comment
loading...

2
-

Colonial Pipeline Paid Hackers $5 Million In Crypto Ransom Hours After Attack

submitted 1 year ago by zyxzevn from zerohedge.com

  • comment
loading...

3
-

Cyberattack Forces Shutdown Of Largest Gasoline Pipeline In United States (The Predicted False Flag?)

submitted 1 year ago by zyxzevn from zerohedge.com

  • comment
loading...

2
-

Prepping for a Cyber "Pandemic": Cyber Polygon to Stage Supply Chain Attack Simulation

submitted 1 year ago by zyxzevn from sociable.co

  • comment
loading...

4
2

I See Deadμops: Leaking Secrets via Intel/AMDMicro-Op Caches

submitted 1 year ago by zyxzevn from engineering.virginia.edu

  • 1 comment
loading...

3
3

John Deere Instigates Hackers - Gets Hacked *AGAIN!!* 🤣 (5:15) ~ Louis Rossmann

submitted 1 year ago by JasonCarswell from youtube.com

  • 1 comment
loading...

1
-

The Curious Case of Port 0 (PDF)

submitted 1 year ago by zyxzevn from dl.ifip.org

  • comment
loading...

3
-

KRACK Attacks: Breaking WPA2

submitted 1 year ago by zyxzevn from krackattacks.com

  • 1 comment
loading...

1
-

How hackers can compromise your computer monitor

submitted 1 year ago by [deleted] from twitter.com

  • comment
loading...

2
1

Killing Capitalism: WEF Warns Of Cyber Attack Leading To Systemic Collapse Of The Global Financial System

submitted 1 year ago by zyxzevn from technocracy.news

  • 1 comment
loading...

19
19

sx: Fast, modern, easy-to-use network scanner

submitted 1 year ago by v-byte-cpu from self.Hacking

  • 3 comments
loading...

1
-

DEFCON 17: Advanced SQL Injection (oldie but good)

submitted 2 years ago by zyxzevn from youtube.com

  • comment
loading...

2
1

Online Hacker Simulator

submitted 2 years ago by [deleted] from prettycoolsite.com

  • comment
loading...

1
-

Spectre explained with live testing

submitted 2 years ago by zyxzevn from leaky.page

  • comment
loading...

1
-

Human Hacking and Social Engineering with Chris Hadnagy (1:03:42) ~ Eric Hunley

submitted 2 years ago by JasonCarswell from youtube.com

  • comment
loading...

4
-

An Unlikely Union Between Hackers and Indigenous Peoples

submitted 2 years ago by [deleted] from thereader.mitpress.mit.edu

  • comment
loading...

1
-

The SolarWinds Hack, The Takeover Of The US & The Final Stage Of The War On You

submitted 2 years ago by zyxzevn from youtube.com

  • 1 comment
loading...

2
-

Hacker Community helps you connect and share with the people in hacking world.

submitted 2 years ago by [deleted] from hackercommunity.org

  • 1 comment
loading...

3
1

"Very Incriminating": Hacker Archives Every Deleted Parler Post (AWS disabled protection, which allowed hackers to dox and get private conversations)

submitted 2 years ago by zyxzevn from zerohedge.com

  • 1 comment
loading...

3
-

The “Russian hacking” NATO psyop has finally been solved

submitted 2 years ago by zyxzevn from off-guardian.org

  • comment
loading...

2
-

Why Online Elections Are Impossible to Secure [TheHatedOne]

submitted 2 years ago by zyxzevn from bitchute.com

  • 1 comment
loading...

2
-

The Great Google Crash: The World’s Dependency Revealed (13:12) ~ ColdFusion

submitted 2 years ago by JasonCarswell from youtube.com

  • comment
loading...

1
-

A security expert reportedly warned SolarWinds in 2019 that anyone could access the company's update server with the password 'solarwinds123'

submitted 2 years ago by zyxzevn from businessinsider.com.au

  • 1 comment
loading...

1
-

Trump Blasts Exaggerated Media Claims Of "Russia, Russia, Russia" In Cyberattack After Seeing Intel

submitted 2 years ago by zyxzevn from zerohedge.com

  • 1 comment
loading...

3
-

"Solarwinds123": Hacked IT Company Used Weak Password, While Backdoor Access Peddled On Underground Forums

submitted 2 years ago by zyxzevn from zerohedge.com

  • 1 comment
loading...

2
-

SolarWinds Exposed FTP Credentials Publicly in a Github Repo

submitted 2 years ago by zyxzevn from savebreach.com

  • 1 comment
loading...

1
-

Create a Reverse Shell Using a Fake MP4 File [Tutorial]

submitted 2 years ago by zyxzevn from youtube.com

  • comment
loading...

2
2

How to get root on Ubuntu 20.04 by pretending nobody’s /home - GitHub Security Lab

submitted 2 years ago by zyxzevn from securitylab.github.com

  • comment
loading...

2
1

Vandals Are Using A Simple Hack To Change Messages On Digital Road Signs

submitted 2 years ago by Drewski from truththeory.com

  • comment
loading...

1
-

sHiTMyseLf - message board for hackers

submitted 2 years ago by [deleted] from github.com

  • comment
loading...

1
-

Hacker Promos - 100+ promotion deals for the hacker community

submitted 2 years ago by [deleted] from hackerpromos.com

  • comment
loading...

1
-

Israel & UAE Committing Cyber Warfare Against US Citizens [Jake Morphonios]

submitted 2 years ago by zyxzevn from bitchute.com

  • comment
loading...

3
-

Modern take on the movie Hackers- to mark the film’s 25th anniversary, we examine Hackers in terms of modern information security.

submitted 2 years ago by [deleted] from kaspersky.com

  • comment
loading...

1
1

When you browse Instagram and find former Australian Prime Minister Tony Abbott's passport number

submitted 2 years ago by [deleted] from mango.pdf.zone

  • comment
loading...

1
-

How Hackers Hack Wi-Fi Automatically Using Besside-ng

submitted 2 years ago by zyxzevn from youtube.com

  • comment
loading...

2
1

Google Maps Hacks

submitted 2 years ago by [deleted] from simonweckert.com

  • comment
loading...

3
-

Confessions of an ID Theft Kingpin, Part I

submitted 2 years ago by [deleted] from krebsonsecurity.com

  • comment
loading...

3
1

Despite Western hysteria over Russian hackers, up to 75% of global cyberattacks originate from US soil – top Moscow security chief

submitted 2 years ago by [deleted] from rt.com

  • 1 comment
loading...

8
1

The Scariest Things We Saw at Black Hat 2020

submitted 2 years ago by [deleted] from pcmag.com

  • 1 comment
loading...

1
-

DEF CON Hackers Compete to Hijack a Satellite in Orbit

submitted 2 years ago by [deleted] from freethink.com

  • comment
loading...

2
-

747-400 Walk through From a Hacker’s Perspective

submitted 2 years ago by [deleted] from youtube.com

  • comment
loading...

3
1

Intel NDA blueprints – 20GB of source code, schematics, specs, docs – spill onto web from partners-only vault

submitted 2 years ago by zyxzevn from theregister.com

  • 1 comment
loading...

1
-

Vulners - 'Google' for hackers

submitted 2 years ago by [deleted] from vulners.com

  • comment
loading...

4
-

Soon, your brain will be connected to a computer. Can we stop hackers breaking in?

submitted 2 years ago by [deleted] from zdnet.com

  • 1 comment
loading...

1
-

Chuck Norris and Hacking Twitter (How many times can a site get hacked?)

submitted 2 years ago by [deleted] from themargins.substack.com

  • comment
loading...

3
-

Twitter Hack that gave admin access. 17 Year old hacker charged. And how it happened.

submitted 2 years ago by zyxzevn from self.Hacking

  • 2 comments
loading...

3
1

Hacking For A COVID-19 Vaccine? (8:39) ~ The Jimmy Dore Show

submitted 2 years ago by JasonCarswell from youtube.com

  • 6 comments
loading...

3
-

Who’s Behind Wednesday’s Epic Twitter Hack? — Krebs on Security

submitted 2 years ago by runtis from krebsonsecurity.com

  • comment
loading...

1
2

Twitter accounts hacked of Bezos, Biden, Gates, Musk, Obama and more

submitted 2 years ago by zyxzevn from files.catbox.moe

  • 1 comment
loading...

1
1

Huge Twitter Hack Hits Apple, Elon Musk, Bill Gates And More

submitted 2 years ago by JasonCarswell from forbes.com

  • comment
loading...

1
-

Israeli Tech Used To "Hack Any Device" Now Used To "Protect" You From COVID (Without Permission)

submitted 2 years ago by zyxzevn from bitchute.com

  • comment
loading...

5
-

An online voting system used in Florida and Ohio can be hacked to alter votes without detection, researchers found

submitted 2 years ago by zyxzevn from businessinsider.nl

  • comment
loading...

1
-

Anonymous hacktivists hack and deface United Nations website, leak Jeffery Epstein's Black Book

submitted 2 years ago by Drewski from androidrookies.com

  • 1 comment
loading...

1
-

Bombshell: Crowdstrike admits 'no evidence' Russia stole emails from DNC server

submitted 2 years ago by zyxzevn from youtube.com

  • 2 comments
loading...

2
1

When you got a data leak..

submitted 3 years ago by zyxzevn from i.imgur.com

  • comment
loading...

2
-

'Unfixable' boot ROM security flaw in millions of Intel chips could spell 'utter chaos' for DRM, file encryption, etc (flaw in ME = open backdoor)

submitted 3 years ago by zyxzevn from theregister.co.uk

  • 2 comments
loading...

4
-

We found 6 critical PayPal vulnerabilities – and PayPal punished us for it

submitted 3 years ago by zyxzevn from cybernews.com

  • 2 comments
loading...

1
-

The Monstrous Lie Behind CrowdStrike (The Ukraine company that claimed Russia might have hacked DNC)

submitted 3 years ago by zyxzevn from amgreatness.com

  • 1 comment
loading...

1
-

Hacking street signs, to make Tesla go far above the speed limit

submitted 3 years ago by zyxzevn from youtube.com

  • 1 comment
loading...

10
-

Technical Report of the Bezos Phone Hack

submitted 3 years ago by zyxzevn from self.Hacking

  • comment
loading...

3
-

Microsoft’s ElectionGuard a Trojan Horse for a Military-Industrial Takeover of US Elections (may 2019)

submitted 3 years ago by zyxzevn from mintpressnews.com

  • 2 comments
loading...

4
1

Israel BUSTED Hacking Americans' Phones

submitted 3 years ago by zyxzevn from bitchute.com

  • comment
loading...

10
7

Critical Windows 10 vulnerability used to Rickroll the NSA and Github

submitted 3 years ago by zyxzevn from arstechnica.com

  • 2 comments
loading...

4
-

Stuxnet -

submitted 3 years ago by zyxzevn from self.Hacking

  • 1 comment
loading...

1
-

Web-backdoors in Toilets, Gas-systems, Voting, etc - Leif Nixon

submitted 3 years ago by zyxzevn from youtube.com

  • comment
loading...

1
-

UK Bank Bruteforce & Checker

submitted 3 years ago by xryptbx from youtube.com

  • comment
loading...

1
-

ALL-UK BANK BRUTE FORCE CHECKER V3

submitted 3 years ago by xryptbx from xryptbx.com

  • comment
loading...

3
-

DEF CON 27 Conference new videos - Post interesting videos below

submitted 3 years ago by zyxzevn from youtube.com

  • 16 comments
loading...

2
1

Rootkit for graphics cards

submitted 3 years ago by zyxzevn from github.com

  • comment
loading...

1
1

How To Haunt a Computer using SSH [Null Byte]

submitted 3 years ago by zyxzevn from youtube.com

  • comment
loading...
view more: next ›
  • about
  • welcome to saidit
  • official sub
  • canary
  • wiki & faq
  • help
  • report spam and site abuse
  • list of subs
  • contact
  • terms & content policy
  • tech
  • open source code
  • apps & clients
  • NAB mirror of saidit
  • saidit mirror of NAB
  • donate
  • patreon
  • cryptocurrency

2023 SaidIt