adr1an@programming.dev · 1 month agoHackers hope to democratize laser-based processor hacking — $500 RayV Lite relies on 3D printing, a laser pen, and a Raspberry Pi to bring costs downplus-squarewww.tomshardware.comexternal-linkmessage-square0fedilinkarrow-up126arrow-down11
arrow-up125arrow-down1external-linkHackers hope to democratize laser-based processor hacking — $500 RayV Lite relies on 3D printing, a laser pen, and a Raspberry Pi to bring costs downplus-squarewww.tomshardware.comadr1an@programming.dev · 1 month agomessage-square0fedilink
demesisx@infosec.pubEnglish · 2 months agohacker 'ghost' on githubplus-squarewww.wired.comexternal-linkmessage-square0fedilinkarrow-up110arrow-down11
arrow-up19arrow-down1external-linkhacker 'ghost' on githubplus-squarewww.wired.comdemesisx@infosec.pubEnglish · 2 months agomessage-square0fedilink
cyph3rPunk@infosec.pubM · 3 months agonew vulnerability in your motherboardplus-squareyoutu.bevideomessage-square0fedilinkarrow-up117arrow-down11
arrow-up116arrow-down1videonew vulnerability in your motherboardplus-squareyoutu.becyph3rPunk@infosec.pubM · 3 months agomessage-square0fedilink
cyph3rPunk@infosec.pubM · 3 months agoXenoRAT | Malware of the Dayplus-squareyoutu.bevideomessage-square1fedilinkarrow-up16arrow-down10
arrow-up16arrow-down1videoXenoRAT | Malware of the Dayplus-squareyoutu.becyph3rPunk@infosec.pubM · 3 months agomessage-square1fedilink
BusKill@lemmy.kde.social · 4 months ago3D-Printed USB Dead Man Switch (Prototype Demo)plus-squarewww.buskill.inexternal-linkmessage-square0fedilinkarrow-up14arrow-down14
arrow-up10arrow-down1external-link3D-Printed USB Dead Man Switch (Prototype Demo)plus-squarewww.buskill.inBusKill@lemmy.kde.social · 4 months agomessage-square0fedilink
cyph3rPunk@infosec.pubM · 4 months agoThe Unbreakable Kryptos Codeplus-squareyoutu.bevideomessage-square1fedilinkarrow-up112arrow-down10
arrow-up112arrow-down1videoThe Unbreakable Kryptos Codeplus-squareyoutu.becyph3rPunk@infosec.pubM · 4 months agomessage-square1fedilink
Jake Farm@sopuli.xyzEnglish · 5 months agoIs there anything stopping this set up from being deployed else where?plus-squareyoutu.bevideomessage-square2fedilinkarrow-up113arrow-down11
arrow-up112arrow-down1videoIs there anything stopping this set up from being deployed else where?plus-squareyoutu.beJake Farm@sopuli.xyzEnglish · 5 months agomessage-square2fedilink
cyph3rPunk@infosec.pubM · 6 months agoMalicious Backdoor in xz liblzmaplus-squareyoutu.bevideomessage-square0fedilinkarrow-up120arrow-down12
arrow-up118arrow-down1videoMalicious Backdoor in xz liblzmaplus-squareyoutu.becyph3rPunk@infosec.pubM · 6 months agomessage-square0fedilink
cyph3rPunk@infosec.pubM · 6 months agonew linux exploit is absolutely insaneplus-squareyoutu.bevideomessage-square0fedilinkarrow-up15arrow-down110
arrow-up1-5arrow-down1videonew linux exploit is absolutely insaneplus-squareyoutu.becyph3rPunk@infosec.pubM · 6 months agomessage-square0fedilink
cyph3rPunk@infosec.pubM · 6 months agoBroadcast LoRa packets WITHOUT a radioplus-squareyoutu.bevideomessage-square3fedilinkarrow-up143arrow-down13
arrow-up140arrow-down1videoBroadcast LoRa packets WITHOUT a radioplus-squareyoutu.becyph3rPunk@infosec.pubM · 6 months agomessage-square3fedilink
demesisx@infosec.pubEnglish · 6 months agoPenetration Testing with Nmap: A Comprehensive Tutorialplus-squareyoutu.bevideomessage-square0fedilinkarrow-up122arrow-down11
arrow-up121arrow-down1videoPenetration Testing with Nmap: A Comprehensive Tutorialplus-squareyoutu.bedemesisx@infosec.pubEnglish · 6 months agomessage-square0fedilink
cyph3rPunk@infosec.pubM · edit-27 months agoHow To Get Arrested In 30 Minutes: Cracking A GSM Capture File In Real-time With AIRPROBE And KRAKENplus-squareyoutu.bevideomessage-square0fedilinkarrow-up140arrow-down14
arrow-up136arrow-down1videoHow To Get Arrested In 30 Minutes: Cracking A GSM Capture File In Real-time With AIRPROBE And KRAKENplus-squareyoutu.becyph3rPunk@infosec.pubM · edit-27 months agomessage-square0fedilink
cyph3rPunk@infosec.pubM · 7 months agoHow to Start a War With a Flash Drive (31:45)plus-squareyoutu.bevideomessage-square0fedilinkarrow-up19arrow-down13
arrow-up16arrow-down1videoHow to Start a War With a Flash Drive (31:45)plus-squareyoutu.becyph3rPunk@infosec.pubM · 7 months agomessage-square0fedilink
cyph3rPunk@infosec.pubM · 8 months agoAdvanced Meshtastic Seriesplus-squarewww.youtube.comvideomessage-square0fedilinkarrow-up112arrow-down11
arrow-up111arrow-down1videoAdvanced Meshtastic Seriesplus-squarewww.youtube.comcyph3rPunk@infosec.pubM · 8 months agomessage-square0fedilink
Jake Farm@sopuli.xyzEnglish · 9 months agoLoRa Meshtastic networks were labeled a threat by Rutgers. Now I am interested.plus-squareyoutube.comvideomessage-square1fedilinkarrow-up117arrow-down10
arrow-up117arrow-down1videoLoRa Meshtastic networks were labeled a threat by Rutgers. Now I am interested.plus-squareyoutube.comJake Farm@sopuli.xyzEnglish · 9 months agomessage-square1fedilink
cyph3rPunk@infosec.pubM · 10 months agoTrue Random Numbers - Computerphile (12:15)plus-squareyoutu.bevideomessage-square0fedilinkarrow-up18arrow-down10
arrow-up18arrow-down1videoTrue Random Numbers - Computerphile (12:15)plus-squareyoutu.becyph3rPunk@infosec.pubM · 10 months agomessage-square0fedilink
demesisx@infosec.pubEnglish · 11 months agoIntell-dragonfly: A Cybersecurity Attack Surface Generation Engine Based On Artificial Intelligence-generated Content Technology. (arXiv:2311.00240v1 [cs.CR])plus-squarearxiv.orgexternal-linkmessage-square0fedilinkarrow-up118arrow-down11
arrow-up117arrow-down1external-linkIntell-dragonfly: A Cybersecurity Attack Surface Generation Engine Based On Artificial Intelligence-generated Content Technology. (arXiv:2311.00240v1 [cs.CR])plus-squarearxiv.orgdemesisx@infosec.pubEnglish · 11 months agomessage-square0fedilink
cyph3rPunk@infosec.pubM · 11 months agoDarknet Diaries: True stories from the dark side of the Internetplus-squaredarknetdiaries.comexternal-linkmessage-square14fedilinkarrow-up131arrow-down12
arrow-up129arrow-down1external-linkDarknet Diaries: True stories from the dark side of the Internetplus-squaredarknetdiaries.comcyph3rPunk@infosec.pubM · 11 months agomessage-square14fedilink
Damaskox@lemmy.world · 11 months agoPigpen Cypher IVlemmy.worldimagemessage-square6fedilinkarrow-up114arrow-down11
arrow-up113arrow-down1imagePigpen Cypher IVlemmy.worldDamaskox@lemmy.world · 11 months agomessage-square6fedilink
Damaskox@lemmy.world · edit-211 months agoPigpen Cypher IIIlemmy.worldimagemessage-square2fedilinkarrow-up112arrow-down10
arrow-up112arrow-down1imagePigpen Cypher IIIlemmy.worldDamaskox@lemmy.world · edit-211 months agomessage-square2fedilink