ThorData - Best Residential Proxy Provider

Recent content by Ed_Cypher

  1. Ed_Cypher

    Malware Write an Android Trojan from scratch

    bro 0B? Why is it empty?
  2. Ed_Cypher

    About the hacker's method in the movie

    Really? I have bought a Raspberry Pi 5 8G, can it be used? Or does it have to be HK5? I want to make a USB flash drive that can be used on Linux, Windows and Android, and can support independent development. For example, when it is inserted into Windows, I will get a rebound shell, file...
  3. Ed_Cypher

    About the hacker's method in the movie

    Look this bro: Cool, man. I just searched for the technology you mentioned and I understand the general principle. I didn't know it really existed. If I want to make something like this and make it look like a USB flash drive, do you have a good tutorial? Including recommendations for equipment...
  4. Ed_Cypher

    About the hacker's method in the movie

    I roughly understand the working principle of this device. I want to ask if there is a universal 3-terminal, that is, automatically identify the system after insertion. The three common terminals are Windows, Linux, and Android (after all, most USB flash drives can be inserted into mobile...
  5. Ed_Cypher

    About the hacker's method in the movie

    Cool, man. I just searched for the technology you mentioned and I understand the general principle. I didn't know it really existed. If I want to make something like this and make it look like a USB flash drive, do you have a good tutorial? Including recommendations for equipment to buy?
  6. Ed_Cypher

    Scam Bible 2022

    Let's see what we can learn from this Bible :tonuge:
  7. Ed_Cypher

    How to behave during interrogation?

    Interesting and dangerous topic , let's see it
  8. Ed_Cypher

    The psychology of fraud

    Cool bro Thanks for share
  9. Ed_Cypher

    About the hacker's method in the movie

    In the past, I always saw some plots about hackers in movies, such as, after a USB flash drive is inserted into the computer, it can be completely controlled. However, I have passed the OSCP exam, and I have been engaged in the network security red team for a while. I always wonder if this...
Top