r/blackhat

Are days really over?

Have been afk for a long time. Cant connect with anybody that i knew a long time back.

Any irc channels that i knew are dead. What are people of trenches doing these days? ' put the fries in the bag " lil bro?

We used to have a great time in those chatrooms. Talk shit, make fun of things, talk about exploits n shit etc.

Guess those days are really over.

reddit.com
u/Anxious_Channel_9263 — 4 days ago
▲ 5 r/blackhat+2 crossposts

Made a pe packer/crypter with a custom vm and compression. Wanting to share it and get feedback/suggestions for updates! thanks :)

u/GuiltyAd2976 — 3 days ago
▲ 5 r/blackhat+2 crossposts

Hi guys!

So basically I run and manage many UGC instagram influencers socialmedias. Long story short, I have noticed that some of the accounts got banned, and even after appeals, they don't get reinstated/they get banned again. I am trying to create some new accounts, and have the influencers create new accounts, but they just get banned again. We don't do anything crazy, there's no real reason, some ban reasonings are super BS and we try and appeal, and some ban reasons are super vague like "content policy" or smth.

Anyways, any tips on how to create new instagram accounts? Not even new instagram accounst for the UGC creators, but just new IG accounts for the future clients that I am trying to work with?

IG has been taking our revenue and reputation because they keep trying to ban us for no reason, and I don't want this to affect our clientele.

reddit.com
u/OtherNarwhal3796 — 6 days ago
▲ 2 r/blackhat+1 crossposts

Hey everyone, I wanted to start this discussion as potentially a checklist for people vibe coding apps and platforms to use as a reference since this is something I'd really appreciate but couldn't find anywhere. What are some security flaws that you see people vibe coding pass by, and how to fix it?

reddit.com
u/gabebere1 — 7 days ago
▲ 6 r/blackhat+4 crossposts

Logging is where data escapes systems

Most teams handle personal data reasonably well in their primary data model. Then logging quietly creates a parallel one, one which is less structured, running on platform defaults, spread across systems nobody mapped when they were set up.

By the time it matters due to an erasure request, a retention audit or a supervisory inquiry, the data has been in places you didn't intend for months or years. And the log management platform you're using? If it contains personal data, it's a data processor. Most teams haven't mapped it that way.

Wrote this as part of a series on building GDPR-compliant systems from the ground up, aimed at builders rather than lawyers. Covers the structural problem, five concrete decisions that actually fix it, and why the system nobody touches is the one that gets audited.

I did my best at breaking it down for you and I hope I am able to help one or two people on their quest to develop compliant software.

https://kolsetu.com/blog/logging-is-where-data-escapes-systems

reddit.com
u/EdikTheFurry — 8 days ago
▲ 14 r/blackhat+2 crossposts

Built a small transparent bridge NAC bypass utility for internal red team engagements and lab research.

The idea is simple: place a Linux host (like a Raspberry Pi) inline between a workstation and switch, preserve the authenticated connection, and allow the operator box to pivot traffic through the victim’s access transparently while keeping the workstation online.

Therefore, you can inject and receive traffic on the network without tracing your footprint

Github Project Link

u/Necrowtf — 13 days ago