Catalog of /tech/

Bottom

Mode: Thread

Max file size: 350.00 MB

Max files: 5

Remember to follow the rules

Max message length: 4096

Open

R: 3 / I: 1 / P: 1

nmap via tor

What do I have to consider if I want to scan an ip address anonymously (via tor) with nmap?

R: 4 / I: 0 / P: 1

I recently bought a cheap eReader with e-ink. I like it, but the resolution and screen size are too small and e-ink monitors are ridiculously overpriced. I'd still love to have a 32 inch e-ink secondary monitor for reading if they weren't so damn expensive. It would not be for gaming or videos because the 15 hertz refresh rate and ghosting is silly, bit because when you're reading it can look so sharp and be easy on the eyes.


Who else likes e-ink?

R: 6 / I: 0 / P: 1

Desktop Environment

What Linux desktop environment is this, anon? What are those widget things on the right?
Open

R: 2 / I: 4 / P: 1

GPT API Keys

Anyone got any repos of gpt4 API keys? Need to try something out but am poor

R: 0 / I: 0 / P: 1

jsreact help

Is there anyone who can help me with the functions of the pen button on https://pixmap.fun please?
Open

R: 1 / I: 1 / P: 1

Learn Programming

Good afternoon guys, I'm new here. Do you know how to indicate a good link to learn cybersecurity? I want to learn advanced programming

R: 2 / I: 0 / P: 1

Is everything adapting for blink or it's gecko is shit?

R: 1 / I: 0 / P: 1

WORM GPT X CHRISTMAS SPECIAL + DISCOUNT!!!

AND THE WORM X (privously Twitter) UPDATED FINAL BEFOR THE NEW YEAR THESE ARE THE CHRISTMAS PRICES!! ❤️

BTC SAVE 20%

API COST 800.00

WEB IS 400.00

Contact:https://t.me/Worm_Gpt_X

Discount:ivan50 (USE IT FOR AN EXTRA DISCOUNT!!!)

R: 1 / I: 0 / P: 1

jailbreaking score 7c tablet

Trying to unlock this tablet. Anyone got the tool to do this?
Open

R: 4 / I: 1 / P: 1

i pirate everything

and i simply leave torrent client on all the time just like my personal computer for online is on all the time
Open

R: 2 / I: 0 / P: 2

Onniforums

Hands down the best darkweb forum for cybersecurity, database leaks and just a place to hangout

No Javascript and No email are needed!

Onniforums main link: http://onnii6niq53gv3rvjpi7z5axkasurk2x5w5lwliep4qyeb2azagxn4qd.onion

Onniforums clearnet: https://onniforums.com

R: 0 / I: 0 / P: 2

Onion email services

Hey anons.
Anyone here know of a good e-mail hosting service on TOR that isn't a honeypot or a shittily-hosted mess? Looking to make an inbox that won't get deleted off the face of the earth or get me arrested. (I'm not looking to commit crimes, but can't take any chances)

R: 1 / I: 0 / P: 2

Black Hat Chat


Share ideas, discuss exploits


Rules
No CP/spam/gore/other illegal activity

http://blkhatjxlrvc5aevqzz5t6kxldayog6jlx5h7glnu44euzongl4fh5ad.onion/





UNBIASED (Not Western/Eastern/Any Propaganda)
Open

R: 3 / I: 0 / P: 2

pci_disable_device unknown parameter error

The pci_disable_device function is defined in the source file of the kernel pci module.

Let the pci_disable_device function be a working parameter of the kernel pci module.

GRUB boot commands works when I type pci=disable_acs_redir=pci:12D8:2308 in linux pci module.

When I type pci=pci_disable_device=pci:12D8:2308 to disable the hardware, it gives unknown parameter error.

what is the reason of this ?

R: 3 / I: 0 / P: 2

youtube-dl website kiked

youtube-dl.org and yt-dl.org now show this error.
>Due to a ruling of the (((Hamburg Regional Court))), access to this website is blocked.
Open

R: 1 / I: 0 / P: 2

OSINT Tools

does anyone have any good OSINT Tools for running background checks on emails,usernames and phonenumbers?

R: 5 / I: 2 / P: 2

How I can find forums for sharing malware in darknet?

R: 0 / I: 0 / P: 2

Tried everything

I tried everything suggested:
Devrant: people just seethed I was talking about programming
Github: ghost town of faggots, doesn't even have a forum, msged every person that does T3d stuff, not one person looked at the repo, got banned for 7 days from "community" for posting a request:
OpenArena Discord: Banned, IP banned, shadowbanned, etc.

This isn't the opensource world of 20 years ago. It's a world of feminist-worshipers, dick-sawing faggots that need to be tortured and then after they are tortured; killed. It is the new-testament world. Women's rights and "chop off yo dick for heaven! Matthew 19".

If the world gets unstable, and Russia does enact WW3, and things become possible, and I am able to do so: I will kill these pro-feminist anti-child bride pro-dick-chopping faggots who banned me from the various places. If I am able to do so during WW3.

They hate freedom of speech. They hate freedom of thought. They want to castrate your boys. They are faggots. And they worship women.
I will kill them fucking dead if a time of chaos arises and I can do so. As revenge.

R: 1 / I: 0 / P: 2

RMS "Approves" GRSecurity GPL violation, says "may" be legal, (won't take action)

>From: Richard Stallman
>To:
>Sent: Tuesday, September 5, 2023 at 08:59:56 PM EDT
>Subject: Re: Could you please sue GRSecurity.
>
>
>[[[ To any NSA and FBI agents reading my email: please consider ]]]
>[[[ whether defending the US Constitution against all enemies, ]]]
>[[[ foreign or domestic, requires you to follow Snowden's example. ]]]
>
>
> > RMS: please. You sued Cisco.
> > Yet this is allowed? (they violate the copyright on your GCC, in addition to the Linux Kernel)
>
>
>
>It is not clear that they are violating the copyright on GCC. It
>looks like what they are doing may be lawful.
>
>We have nothing legally to do with Linux, the kernel.
>--
>Dr Richard Stallman (https://stallman.org)
>Chief GNUisance of the GNU Project (https://gnu.org)
>Founder, Free Software Foundation (https://fsf.org)
>Internet Hall-of-Famer (https://internethalloffame.org)
>
>
>
>
>
---------------------------------------------------------------------------------------
(my response: )
>
>
>They are distributing non-separable derivative works to GCC under a no-redistribution agreement.
>Which is an additional restriction forbidden by the license you granted to them of your Copyrighted work (infact of your own Authorship aswell).
>
>>may be lawful
>See the word you used: may
>Anything may be lawful before a case of first impression is brought.
>Please bring one.
>
>Those patches and plugins they distribute cannot be used with anything other than GCC
>They are infact non-seperable derivative works. You have standing and reason to sue.
>Please do so.
>
>PLEASE.
>
Open

R: 1 / I: 0 / P: 2

GLOWY-RESISTANT PILLS

what is considered the best way to browse the web and interact with technology in general and remain anonymous if your threat model includes 3 letter glowboys?
Open

R: 0 / I: 0 / P: 3

Need custom ransomware for 1 specific target

I need a custom ransomware for a specific target, know jack shit on coding. I have all the incriminating information I need though. Just need the software.

My target's computer is a Mac desktop computer.

Where can I find one to buy

R: 0 / I: 0 / P: 3

JavaScriptless/No JS imageboard software

Collection of 5 JavaScript-less imageboard software. dietchan, nanochan, lambdaplusjs, phichannel and picochan. dietchan is in German, the others in English. They're pretty similar to each other. Downloaded/scraped straight from their respective original sources, no modifications or additions.

R: 3 / I: 1 / P: 3

l0icense thread

What is a good or a bad l0icense?
Open

R: 5 / I: 0 / P: 3

So uh

Anyone wanna help me find a proxy site so I can use discord on my chromebook

R: 10 / I: 4 / P: 3

Anonymous SSH chat

Anyone interested to have old school hacker chat anonymously? And I really mean it, truly anonymously. Anonymous deep webs chat using SSH, that's right, no web / js soykaf.
ysdr3c3j7odl3p2zu5vdyaphf5x65l4hc3i2hmuy4vx4svibnxonvsqd on the onion network and port is 1337 protocol SSH as mentioned earlier.

R: 2 / I: 0 / P: 3

MASSIVE HACKING TOOLS COLLECTION DOWNLOAD 799MB

MASSIVE HACKING TOOLS COLLECTION DOWNLOAD 799MB

https://archive.org/details/tools_202210
Open

R: 4 / I: 0 / P: 3

The 'real' hidden.wiki?

n00b here looking into tor again - looks like there are quite a few 'hidden wikis' on a clearnet search, of course the sites can be set up by anyone. I'm interested in an old respected host that people have had good experience with, so that I can start building up my knowledge of whats on Tor.

Thanks for any help

R: 1 / I: 1 / P: 3

Robotics

Hello there! I'm not speak english, so I'm sorry if your don't understand some of what a tell to your in my post. Well! I have the needed to learn robotics, at least, the basic to rotate and jawing a camera, like a security camera does. And I have to learn it on TOR. Don't ask way, please! Do you know a book, course, web page or any resource to start to learn? Thanks!

R: 17 / I: 3 / P: 3

Alternative tech suggestions

Question: Is there an alternate site or tool to use twitter? Preferably one that doesn't use JavaScript. Twitter's not letting me scroll eternally and is asking me to sign in to continue.


Any more tech tools or suggestions are welcome here.

R: 42 / I: 10 / P: 3

Where did 8/tech/ go? I noticed that tech boards other than 4/g/, nano, and lain have really low activity or are dead.

R: 1 / I: 0 / P: 4

Picture chat

A new no-logs anon chat service with pictures. Open source and easy to host. Auto-reloads allow live hacking of the code without losing the messages that are only stored in RAM.

Setup your own instances for whatever groups you need on Tor/I2P. Recommended to run as systemd unit with DynamicUser=yes sandboxing but runs also on terminal with a simple command and is secure without any sandboxing. Does not write any files nor use any database.

Finnish instance:
chattaavacmowol2z62co2p3mmqmuoe6otlmbtthwngracvzc6pixgyd.onion

R: 8 / I: 7 / P: 4

Technology companies cannot be bought with money alone.

Technology companies cannot be bought with money alone.

The main reason why Elon Musk could not buy Twitter is because technology companies cannot be bought with pure money power.

In order for you to actually buy technology companies, you need to deter other power elements related to the relevant technology company and secretly take control of the electronic, cybernetic and telemetric devices used by those companies beforehand.

Before purchasing, you should also secretly control the employees of the relevant technology company.

The real owner of Twitter is MOSSAD. The American Nationalist Forces behind Elon Musk are actually trying to buy Twitter from MOSSAD. Since the original owner of Twitter is MOSSAD, it is difficult to secretly take control of Twitter employees and the servers and other devices Twitter uses. Because of this difficulty, Elon Musk and the US Nationalist Forces behind him are prolonging the process with various excuses.

R: 0 / I: 0 / P: 4

ALIEN TECHNOLOGY VIDEOS Downloads

Open

R: 0 / I: 0 / P: 4

Is there any way to get data of specific TikTok users/accounts?

Just wanted to ask if theres any way to get data that TikTok collected from specific users and if so, how do i get them and how precise are they.

R: 4 / I: 0 / P: 4

SpeakUp: Silent Speech Interface; Low Cost; Arduino; Machine Learning

Project Summary by Varun Chandrashekhar: "I have designed and developed a speech interfaced for the paralyzed, which they can use to communicate without speaking. This device detects speech-related electrical signals from the throat and converts them into letters or words that we recognize using machine learning models."

SpeakUp - ML Based Speech Aid to Enable Silent Communication https://create.arduino.cc/projecthub/Varun_Chandrashekhar/speakup-ml-based-speech-aid-to-enable-silent-communication-ffd9f8

My comment about the project: easily replicable by anyone with computer science knowledge, different from what is being done with the silicon trojans in the 3G/4G/5G equipment only on it needing physical probes. Anyone doing research on this area be cautious of sabotage when using US designed CPUs (AMD/INTEL/QUALCOMM/APPLE/ARM), as the microcode, SMM and firmware of your system may be manipulated to mess up your computations. Ask your own Nation to stop trusting Silicon Valley and make your own silicon supply chain and tech services. Meanwhile, mitigate this situation by moving to an area away from any cell radio transmitter (check coverage on OpenCellID.org) and shielding yourself and your devices from electromagnetic eavesdropping and interference.

R: 3 / I: 1 / P: 4

to avoid the appearance of government propaganda

https://theintercept.com/2022/10/31/social-media-disinformation-dhs/
Leaked Documents Outline DHS’s Plans to Police Disinformation
October 31 2022, 9:00 a.m.

Behind closed doors, and through pressure on private platforms, the U.S. government has used its power to try to shape online discourse. According to meeting minutes and other records appended to a lawsuit filed by Missouri Attorney General Eric Schmitt, a Republican who is also running for Senate, discussions have ranged from the scale and scope of government intervention in online discourse to the mechanics of streamlining takedown requests for false or intentionally misleading information.
[...]
There is also a formalized process for government officials to directly flag content on Facebook or Instagram and request that it be throttled or suppressed through a special Facebook portal that requires a government or law enforcement email to use. At the time of writing, the “content request system” at facebook.com/xtakedowns/login is still live. DHS and Meta, the parent company of Facebook, did not respond to a request for comment. The FBI declined to comment.
[...]
To accomplish these broad goals, the report said, CISA should invest in external research to evaluate the “efficacy of interventions,” specifically with research looking at how alleged disinformation can be countered and how quickly messages spread. Geoff Hale, the director of the Election Security Initiative at CISA, recommended the use of third-party information-sharing nonprofits as a “clearing house for information to avoid the appearance of government propaganda.”

R: 3 / I: 5 / P: 4

antigravity

UFO engine

R: 4 / I: 0 / P: 4

[BBC News] Enigma da síndrome de Havana, que ataca diplomatas americanos e intriga cientistas

https://youtube.com/watch?v=Gi1ZyWLex2E [Embed]

Espionagem Eletromagnética e Mandantes de Adélio Bispo

Quando o Presidente diz que "5G é usado para espionagem" e que "urnas são passível de fraude", ele está correto mas não sabe como apontar evidência. Eu sei e fornecerei um método experimental para que a Polícia Federal possa se convencer disso. Porém, não somente urnas, mas todos os computadores e celulares (os da União inclusos) são passíveis de interferência e não é apenas o 5G que é responsável por espionagem eletromagnética, mas silicon trojans implantados nas torres desde o 2G. Isso permite não só controlar os silicon trojans nós processadores, mas também é usado para causar a Síndrome de Havana que atinge pessoas pelo mundo.

O modo de espionagem sendo usado para manipular pessoas como o Adélio Bispo a cometer crimes é usado no Brasil por um grupo também responsável por sites de ódio como "Dogolachan" e mercados de drogas como "Nightmare Market". Porém eles são apenas usuários do sistema de espionagem, que também é usado internacionalmente. A tecnologia é americana mas não governamental. Como os dados obtidos com essa espionagem também abastece serviços automatizados de recomendação de propagandas e conteúdo (outro método de gerar dinheiro para eles), há uma abertura para demonstrar que sistemas não conectados a internet estão vazando informações através dessa espionagem eletromagnética.

Quando uma empresa como o NSO Group oferece o Pegasus, eles fazem uma demonstração para que fique claro que conseguem acessar dispositivos celulares. O que estou oferecendo é um modo de demonstrar a ocorrência de espionagem eletromagnética que obtém dados de todos os computadores de modo contínuo. Uma vez evidenciado isso, indícios dos crimes facilitados por essa espionagem ficarão crediveis.

R: 10 / I: 0 / P: 4

Best Vpn?

What's the best VPN in terms of:

Usable on windows/linux/mac

no logs

Accepts payment privately and doesn't log any payment details?

R: 19 / I: 2 / P: 4

Lenovo t420

am i making a good choice? just need something reliable and not fancy at all.

R: 6 / I: 0 / P: 5

So whonix + fully configured tor, what's the next levels to even higher security, /tech/?
Open

R: 0 / I: 0 / P: 5

/tech/ hasn't been the same since 8ch went to shit. where did you go, anon?

R: 10 / I: 0 / P: 5

What is the best alternative to laundering the Bitcoin I have illegally earned?

Is there another way to turn my "dirty" Bitcoin into clean money without having to buy monero?

I'm talking about an 8 digit amount, any suggestions

R: 0 / I: 0 / P: 5

Alternative to Tornado Cash

Thought I would spread the word about a new privacy wallet that is integrated into Railgun. It's called Railway. It uses zk-snark proofs and works across any EVM capable chain. Imagine MetaMask, but if it had the ability to send 100% private transactions. That's what Railway is. Any ERC-20 or ERC-721 token can be transacted with with 100% anonymity.
Open

R: 0 / I: 0 / P: 5

Anyone knows a working SIM swapping provider?

I found simswap.su but it look scammy
Open

R: 0 / I: 0 / P: 5

Arch

I use Arch btw.
Open

R: 0 / I: 0 / P: 5

I am your subject

i like you dam hackers!!!!!
maybe one day ill a>the haker one to bring the end

R: 6 / I: 4 / P: 5

Programming question

Im trying to make a chat site so i need to know something
I am going to have a stacked div layout and the text will replace itself however i am not sure how to keep the text on screen even when refreshed im using html, java, css, and php (i, know garbage) and using both chrome and firefox in windows 10

R: 3 / I: 0 / P: 5

What is Darkestdepth
Open

R: 0 / I: 0 / P: 5

Take precautions against secret usb implants

I am using Linux operating system.

My computer is not connected to the internet , I formatted it and changed the bios firmware and hard disk firmware. However, the program opens by itself, the mouse cursor moves by itself, and sometimes the system's default audio service is turned off.

When I examine it with the Wireshark program, an interrupt signal comes from the usb ports, even though there is no device plugged into the usb ports. The interrupt signal comes from linux's default idle hardware.
I have a hidden implant in my computer that looks like the NSA ANT COTTONMOUTH tool.
Wireshark logs https://easyupload.io/eqrfr6

This hidden usb implant can easily bypass all antivirus and security software by introducing itself as a hidden system process by overflowing the kernel, regardless of linux or windows operating system, during computer startup.

On computers that cannot exceed the kernel security, it introduces itself as a different hardware and takes over the control of the system via memory buffer overflow by overloading the interrupt. No antivirus and security software can detect this situation.

This hidden usb implant is not simple usb keyboard like ruber ducky and usb ninja. For this reason, do not recommend simple and useless scripts such as "usb guard". This implant is an advanced usb spying implant similar to NSA COTTONMOUTH.

My request from the linux community is to develop a security module for the linux operating system against hidden usb implants.

Top