hackeridiot

hackeridiot

Last seen: 3 days ago

Member since Aug 26, 2021 admin@hackeridiot.com

Following (0)

Followers (0)

Declassified files
bg
FBI File on the Rockefeller Commission

FBI File on the Rockefeller Commission

Background The United States President’s Commission on CIA Activities within the...

Declassified files
bg
Internal DoD/IG PowerPoint Presentation on UFO/UAP Evaluation Released

Internal DoD/IG PowerPoint Presentation on UFO/UAP Evaluation...

On September 16, 2021, The Black Vault received via Freedom of Information Act (FOIA)...

Declassified files
bg
Mobility Research for Future Vehicles: A Methodology to Create a Unified Trade-Off Environment for Advanced Aerospace Vehicle – January 2018

Mobility Research for Future Vehicles: A Methodology to...

The development and implementation of advanced aerospace vehicles is an endeavor...

Declassified files
bg
FBI Files: Celebrities

FBI Files: Celebrities

The following is a list of FBI files on different celebrities.  Declassified Celebrity...

Declassified files
bg
FBI Files: Historical Figures & Groups

FBI Files: Historical Figures & Groups

Background The following are FBI files of important people, organizations and even...

Declassified files
bg
FBI Files: American Politicians, Aides, and Appointees

FBI Files: American Politicians, Aides, and Appointees

It comes as no surprise, as celebrities and gangsters were being watched — so were...

Declassified files
bg
Manned Venus Flyby (Proposal), February 1, 1967

Manned Venus Flyby (Proposal), February 1, 1967

This study is one of several conducted at Bellcomm and in Manned Space Flight whose...

Declassified files
bg
The Maya Astronomical Computer, by Charles H. Lacombe and [REDACTED], Winter 1977

The Maya Astronomical Computer, by Charles H. Lacombe and...

This paper presents evidence of a visual astronomical computer which would have...

Declassified files
bg
“Private” Chinese Aerospace Defense Companies, China Aerospace Studies Institute (CASI), June 14, 2020

“Private” Chinese Aerospace Defense Companies, China Aerospace...

CASI’s mission is to advance understanding of the capabilities, development, operating...

Hacking
bg
Certify - Active Directory Certificate Abuse

Certify - Active Directory Certificate Abuse

Certify is a C# tool to enumerate and abuse misconfigurations in Active Directory...

Hacking
bg
Pwncat - Fancy Reverse And Bind Shell Handler

Pwncat - Fancy Reverse And Bind Shell Handler

pwncat is a post-exploitation platform for Linux targets. It started out as a wrapper...

Hacking
bg
Kekeo - A Little Toolbox To Play With Microsoft Kerberos In C

Kekeo - A Little Toolbox To Play With Microsoft Kerberos...

kekeo is a little toolbox I have started to manipulate Microsoft Kerberos in C (and...

Hacking
bg
LeakDB - Web-Scale NoSQL Idempotent Cloud-Native Big-Data Serverless Plaintext Credential Search

LeakDB - Web-Scale NoSQL Idempotent Cloud-Native Big-Data...

LeakDB is a tool set designed to allow organizations to build and deploy their own...

Hacking
bg
efiXplorer - IDA Plugin For UEFI Firmware Analysis And Reverse Engineering Automation

efiXplorer - IDA Plugin For UEFI Firmware Analysis And...

efiXplorer - IDA plugin for UEFI firmware analysis and reverse engineering automation...

Hacking
bg
AutomatedLab - A Provisioning Solution And Framework That Lets You Deploy Complex Labs On HyperV And Azure With Simple PowerShell Scripts

AutomatedLab - A Provisioning Solution And Framework That...

AutomatedLab (AL) enables you to setup test and lab environments on Hyper-v or Azure...

Cyber Security
bg
FCC Proposal Targets SIM Swapping, Port-Out Fraud

FCC Proposal Targets SIM Swapping, Port-Out Fraud

The U.S. Federal Communications Commission (FCC) is asking for feedback on new proposed...

Cyber Security
bg
Gift card fraud: four suspects hit with money laundering charges

Gift card fraud: four suspects hit with money laundering...

Gift card fraud may sound like small beer against ransomware - but it's personal,...

Hacking
bg
Bug Bounty vs. CTF [Understanding Differences & Benefits]

Bug Bounty vs. CTF [Understanding Differences & Benefits]

Trying to understand the difference between a bug bounty vs. CTF? We explain the...

Donate to us on BuyMeACoffee also we have built an app for this site with the real-time post receiving and notification to go and download it.