A sentimental tour of late 1990s and early 2000s hacking tools
https://andreafortuna.org/2026/05/13/amarcord/
#HackerNews #sentimentalhacking #1990s #2000s #hackingtools #nostalgia #techhistory
A sentimental tour of late 1990s and early 2000s hacking tools
https://andreafortuna.org/2026/05/13/amarcord/
#HackerNews #sentimentalhacking #1990s #2000s #hackingtools #nostalgia #techhistory
The ESP32 Has Quietly Become One of the Most Interesting Hacker Devices Alive
Expensive hardware often becomes ornamental. People baby it. They curate it. They build identities around owning it. Cheap hardware gets modified until it resembles evidence recovered from a flooded basement.Pentesters often use browser extensions because they keep testing close to the web app—making it easier to inspect cookies, tweak traffic, and catch client-side issues without constantly switching tools
Here are useful browser extensions for pentesting 😎👇
Find high-res pdf ebooks with all my cybersecurity related infographics at https://study-notes.org
#pentesting #cybersecurity #hackingtools #learnhacking #ethicalhacker
The Flipper Zero Black Book: Useful, Strange, and Slightly Concerning Payloads
People online either massively overestimate the device or completely misunderstand it. One side treats it like a cyberpunk skeleton key capable of collapsing civilization from the parking lot of a Best Buy. The other side dismisses it as a glorified toy for Redditors who wear tactical backpacks to Starbucks.🔵🟡 Government Hacking Tools Are Now in Criminals' Hands (with @lorenzofb.bsky.social @lorenzofb )
by Joseph Cox @josephcox
at 404 Media
@404media.co @404mediaco
#HackingTools #Hacked #Leaked #podcast #cybersecurity
Building a $40 Stingray Detector That Fits in an Altoids Tin
You don’t see IMSI catchers. You don’t hear them. They sit between your phone and the network like a polite lie, impersonating a tower just well enough that your device shrugs and connects anyway. No warning. No vibration. Nothing in the UI suggests that your phone has just been convinced to trust something it never verified.Want to learn and expand your cybersecurity toolset?
Look no further than our Group!
Best pentesters ("hackers") toolkits
Telegram: https://t.me/ZannysMarket
This Is What a Personal Surveillance System Actually Looks Like
You stop thinking of it as surveillance. It becomes “the system.” Just part of how things run.