-
Notifications
You must be signed in to change notification settings - Fork 1
jokes
My silly computer related jokes...
- Surfing anonymously sucks
- Daily Web $h!t
- What is your phone number?
- Are you a bad hacker?
- Wi-Fi Access Points
Q:
Hello,
What's your phone number?
Want to call you for new opportunities!
A:
Hi there,
My Phone number is +32 496 28 38 96
But honestly, I prefer VOIP (Voice Over IP) calls.
That's free and unlimited
And we can do video calls too.
Q:
Ah Ok, but I have no clue what you are talking about.
A:
No problem, I'm used to that.
Give me your IP and I will call you.
You can get that number from here: https://www.whatismyip.com/
Q:
Alright, here you go: xxx.xxx.xxx.xxx
A:
I'm sorry, my VOIP software just crashed. I have no clue why.
I need to fix this, but I wonder where to begin
This will take a few day...
Do you mind if I call you in let's say, 3 days or more?
I have a lot of work to figure out some things.
Q:
No problem,
Take your time and call me when possible.
Never called, just hacked and know enough now.
Q:
Are you a bad hacker?
A:
What do you mean exactly?
Q:
Well, are you a black or grey hat hacker?
A:
Ask my ex girlfriends
Even after cheating, I did not hack them...
Nor during our relationship.
That's why i'm stupid and a white hat hacker.
How to recognise the hat they are wearing?
When scanning, I see 106 Wireless access points...
Black Hat:
Cool, this is dope
Grey Hat
I dont give a $h!t, let's try
White Hat
Damn, where is my AP?
Peace & Love © All Rights Reserved on that
- Information Gathering
- Exploiting
- Post Exploitation on Linux
-
Post Exploitation on Windows
-
Information Gathering
- System
- Network
- User Accounts
- Obtain user's information
- Credentials
- Configs
- Finding Important Files
- Other Utilities
-
Covering Your Tracks
- Avoiding history filesmys
- Deleting and Destroying
- Escalating
- Delivery methods
-
Maintaining Control
- Windows Startup folder
- With the registry
- Using BITS
- Reverse Shell
- Execute a Remote Script
- Powershell Cheat Sheet
- Resources
-
Information Gathering
- Web Application Attacks
- Tools List
-
Securing - Hardening
- Awareness
- Network
- Web Server
- SSH Server
- FTP Server
- Hardening Tools and Tips
- GPG Keys
- Not Sorted Yet
- About
- Resources