Catalog of /tech/


Mode: Thread

Max file size: 350.00 MB

Max files: 5

Remember to follow the rules

Max message length: 4096


R: 0 / I: 0 / P: 1

Got fished, how can I get revenge now?

Hi everyone,
So I got scammed and sent money into some shady crypto brokerage. Noticeable amount, it'll take months for me to recover from that.
Now I want to try and have revenge.

So far:
• Their website runs on a separate VPS
• Only SSH and HTTP/S ports are open
• I've found where the admin panel must be located, it requires basic HTTP auth
• The API is exposed but there is nothing useful, the real stuff seems to be in the admin panel
• I've started bruteforcing ssh "root" user, and "admin" panel user with rockyou list; I don't think that will work tho

Any ideas what could I try next? I'll go to sleep now but I'd be delighted to read your suggestions in the morning, thanks!

R: 2 / I: 0 / P: 1

Darknet Discussions [Embed]

R: 12 / I: 4 / P: 1

Anonymous SSH chat

Anyone interested to have old school hacker chat anonymously? And I really mean it, truly anonymously. Anonymous deep webs chat using SSH, that's right, no web / js soykaf.
ysdr3c3j7odl3p2zu5vdyaphf5x65l4hc3i2hmuy4vx4svibnxonvsqd on the onion network and port is 1337 protocol SSH as mentioned earlier.

R: 1 / I: 0 / P: 1

Why you should use the hidden wiki

If you want to get on the deep and dark web and explore everything it has to offer, but have no idea where to start, do not worry, there is a solution! It's called the Hidden Wiki and is a great way for anyone to get started on the deep web. Essentially, it is everything you need to start your adventures on the dark web: a list of links, reads, and things to do! It just got a brand new link too! (http://zqktlwiuavvvqqt4ybvgvi7tyo4hjl5xgfuvpdf6otjiycgwqbym2qad.onion)
Just put that link into the TOR Browser and you'll be there! Ready to surf! I could not suggest it more and hope this helps you all,


A tech enthusiast

R: 5 / I: 0 / P: 1



R: 0 / I: 0 / P: 1

Get Hodl of this Gem Guys !!!!

🎨 Calling all developers and #NFT enthusiasts!

Discover endless possibilities with @AndromedaProt & @StargazeZone

Build on specialized #NFT infrastructure, explore cross-chain interoperability & seize new monetization opportunities

Start innovating now! 🛠️


Andromeda OFFICIAL Handles:

R: 1 / I: 0 / P: 1

Onion email services

Hey anons.
Anyone here know of a good e-mail hosting service on TOR that isn't a honeypot or a shittily-hosted mess? Looking to make an inbox that won't get deleted off the face of the earth or get me arrested. (I'm not looking to commit crimes, but can't take any chances)

R: 0 / I: 0 / P: 1

What is your favorite Gadget?

Anything you like even if it's not necessarly useful :
- deauther
- badusb
- bug detector

R: 6 / I: 2 / P: 1

nmap via tor

What do I have to consider if I want to scan an ip address anonymously (via tor) with nmap?

R: 1 / I: 0 / P: 1

Tried everything

I tried everything suggested:
Devrant: people just seethed I was talking about programming
Github: ghost town of faggots, doesn't even have a forum, msged every person that does T3d stuff, not one person looked at the repo, got banned for 7 days from "community" for posting a request:
OpenArena Discord: Banned, IP banned, shadowbanned, etc.

This isn't the opensource world of 20 years ago. It's a world of feminist-worshipers, dick-sawing faggots that need to be tortured and then after they are tortured; killed. It is the new-testament world. Women's rights and "chop off yo dick for heaven! Matthew 19".

If the world gets unstable, and Russia does enact WW3, and things become possible, and I am able to do so: I will kill these pro-feminist anti-child bride pro-dick-chopping faggots who banned me from the various places. If I am able to do so during WW3.

They hate freedom of speech. They hate freedom of thought. They want to castrate your boys. They are faggots. And they worship women.
I will kill them fucking dead if a time of chaos arises and I can do so. As revenge.

R: 7 / I: 0 / P: 2

I recently bought a cheap eReader with e-ink. I like it, but the resolution and screen size are too small and e-ink monitors are ridiculously overpriced. I'd still love to have a 32 inch e-ink secondary monitor for reading if they weren't so damn expensive. It would not be for gaming or videos because the 15 hertz refresh rate and ghosting is silly, bit because when you're reading it can look so sharp and be easy on the eyes.

Who else likes e-ink?

R: 3 / I: 0 / P: 2


Hands down the best darkweb forum for cybersecurity, database leaks and just a place to hangout

No Javascript and No email are needed!

Onniforums main link: http://onnii6niq53gv3rvjpi7z5axkasurk2x5w5lwliep4qyeb2azagxn4qd.onion

Onniforums clearnet:

R: 2 / I: 0 / P: 2


does anyone have any good OSINT Tools for running background checks on emails,usernames and phonenumbers?

R: 6 / I: 0 / P: 2

Desktop Environment

What Linux desktop environment is this, anon? What are those widget things on the right?

R: 2 / I: 4 / P: 2


Anyone got any repos of gpt4 API keys? Need to try something out but am poor

R: 0 / I: 0 / P: 2

jsreact help

Is there anyone who can help me with the functions of the pen button on please?

R: 1 / I: 1 / P: 2

Learn Programming

Good afternoon guys, I'm new here. Do you know how to indicate a good link to learn cybersecurity? I want to learn advanced programming

R: 2 / I: 0 / P: 2

Is everything adapting for blink or it's gecko is shit?

R: 1 / I: 0 / P: 2




API COST 800.00

WEB IS 400.00


Discount:ivan50 (USE IT FOR AN EXTRA DISCOUNT!!!)

R: 1 / I: 0 / P: 2

jailbreaking score 7c tablet

Trying to unlock this tablet. Anyone got the tool to do this?

R: 4 / I: 1 / P: 3

i pirate everything

and i simply leave torrent client on all the time just like my personal computer for online is on all the time

R: 1 / I: 0 / P: 3

Black Hat Chat

Share ideas, discuss exploits

No CP/spam/gore/other illegal activity


UNBIASED (Not Western/Eastern/Any Propaganda)

R: 3 / I: 0 / P: 3

pci_disable_device unknown parameter error

The pci_disable_device function is defined in the source file of the kernel pci module.

Let the pci_disable_device function be a working parameter of the kernel pci module.

GRUB boot commands works when I type pci=disable_acs_redir=pci:12D8:2308 in linux pci module.

When I type pci=pci_disable_device=pci:12D8:2308 to disable the hardware, it gives unknown parameter error.

what is the reason of this ?

R: 3 / I: 0 / P: 3

youtube-dl website kiked and now show this error.
>Due to a ruling of the (((Hamburg Regional Court))), access to this website is blocked.

R: 5 / I: 2 / P: 3

How I can find forums for sharing malware in darknet?

R: 1 / I: 0 / P: 3

RMS "Approves" GRSecurity GPL violation, says "may" be legal, (won't take action)

>From: Richard Stallman
>Sent: Tuesday, September 5, 2023 at 08:59:56 PM EDT
>Subject: Re: Could you please sue GRSecurity.
>[[[ To any NSA and FBI agents reading my email: please consider ]]]
>[[[ whether defending the US Constitution against all enemies, ]]]
>[[[ foreign or domestic, requires you to follow Snowden's example. ]]]
> > RMS: please. You sued Cisco.
> > Yet this is allowed? (they violate the copyright on your GCC, in addition to the Linux Kernel)
>It is not clear that they are violating the copyright on GCC. It
>looks like what they are doing may be lawful.
>We have nothing legally to do with Linux, the kernel.
>Dr Richard Stallman (
>Chief GNUisance of the GNU Project (
>Founder, Free Software Foundation (
>Internet Hall-of-Famer (
(my response: )
>They are distributing non-separable derivative works to GCC under a no-redistribution agreement.
>Which is an additional restriction forbidden by the license you granted to them of your Copyrighted work (infact of your own Authorship aswell).
>>may be lawful
>See the word you used: may
>Anything may be lawful before a case of first impression is brought.
>Please bring one.
>Those patches and plugins they distribute cannot be used with anything other than GCC
>They are infact non-seperable derivative works. You have standing and reason to sue.
>Please do so.

R: 1 / I: 0 / P: 3


what is considered the best way to browse the web and interact with technology in general and remain anonymous if your threat model includes 3 letter glowboys?

R: 0 / I: 0 / P: 3

Need custom ransomware for 1 specific target

I need a custom ransomware for a specific target, know jack shit on coding. I have all the incriminating information I need though. Just need the software.

My target's computer is a Mac desktop computer.

Where can I find one to buy

R: 0 / I: 0 / P: 3

JavaScriptless/No JS imageboard software

Collection of 5 JavaScript-less imageboard software. dietchan, nanochan, lambdaplusjs, phichannel and picochan. dietchan is in German, the others in English. They're pretty similar to each other. Downloaded/scraped straight from their respective original sources, no modifications or additions.

R: 3 / I: 1 / P: 3

l0icense thread

What is a good or a bad l0icense?

R: 5 / I: 0 / P: 4

So uh

Anyone wanna help me find a proxy site so I can use discord on my chromebook

R: 4 / I: 0 / P: 4

The 'real'

n00b here looking into tor again - looks like there are quite a few 'hidden wikis' on a clearnet search, of course the sites can be set up by anyone. I'm interested in an old respected host that people have had good experience with, so that I can start building up my knowledge of whats on Tor.

Thanks for any help

R: 1 / I: 1 / P: 4


Hello there! I'm not speak english, so I'm sorry if your don't understand some of what a tell to your in my post. Well! I have the needed to learn robotics, at least, the basic to rotate and jawing a camera, like a security camera does. And I have to learn it on TOR. Don't ask way, please! Do you know a book, course, web page or any resource to start to learn? Thanks!

R: 17 / I: 3 / P: 4

Alternative tech suggestions

Question: Is there an alternate site or tool to use twitter? Preferably one that doesn't use JavaScript. Twitter's not letting me scroll eternally and is asking me to sign in to continue.

Any more tech tools or suggestions are welcome here.

R: 42 / I: 10 / P: 4

Where did 8/tech/ go? I noticed that tech boards other than 4/g/, nano, and lain have really low activity or are dead.

R: 1 / I: 0 / P: 4

Picture chat

A new no-logs anon chat service with pictures. Open source and easy to host. Auto-reloads allow live hacking of the code without losing the messages that are only stored in RAM.

Setup your own instances for whatever groups you need on Tor/I2P. Recommended to run as systemd unit with DynamicUser=yes sandboxing but runs also on terminal with a simple command and is secure without any sandboxing. Does not write any files nor use any database.

Finnish instance:

R: 8 / I: 7 / P: 4

Technology companies cannot be bought with money alone.

Technology companies cannot be bought with money alone.

The main reason why Elon Musk could not buy Twitter is because technology companies cannot be bought with pure money power.

In order for you to actually buy technology companies, you need to deter other power elements related to the relevant technology company and secretly take control of the electronic, cybernetic and telemetric devices used by those companies beforehand.

Before purchasing, you should also secretly control the employees of the relevant technology company.

The real owner of Twitter is MOSSAD. The American Nationalist Forces behind Elon Musk are actually trying to buy Twitter from MOSSAD. Since the original owner of Twitter is MOSSAD, it is difficult to secretly take control of Twitter employees and the servers and other devices Twitter uses. Because of this difficulty, Elon Musk and the US Nationalist Forces behind him are prolonging the process with various excuses.

R: 0 / I: 0 / P: 4



R: 0 / I: 0 / P: 4

Is there any way to get data of specific TikTok users/accounts?

Just wanted to ask if theres any way to get data that TikTok collected from specific users and if so, how do i get them and how precise are they.

R: 4 / I: 0 / P: 4

SpeakUp: Silent Speech Interface; Low Cost; Arduino; Machine Learning

Project Summary by Varun Chandrashekhar: "I have designed and developed a speech interfaced for the paralyzed, which they can use to communicate without speaking. This device detects speech-related electrical signals from the throat and converts them into letters or words that we recognize using machine learning models."

SpeakUp - ML Based Speech Aid to Enable Silent Communication

My comment about the project: easily replicable by anyone with computer science knowledge, different from what is being done with the silicon trojans in the 3G/4G/5G equipment only on it needing physical probes. Anyone doing research on this area be cautious of sabotage when using US designed CPUs (AMD/INTEL/QUALCOMM/APPLE/ARM), as the microcode, SMM and firmware of your system may be manipulated to mess up your computations. Ask your own Nation to stop trusting Silicon Valley and make your own silicon supply chain and tech services. Meanwhile, mitigate this situation by moving to an area away from any cell radio transmitter (check coverage on and shielding yourself and your devices from electromagnetic eavesdropping and interference.

R: 3 / I: 1 / P: 5

to avoid the appearance of government propaganda
Leaked Documents Outline DHS’s Plans to Police Disinformation
October 31 2022, 9:00 a.m.

Behind closed doors, and through pressure on private platforms, the U.S. government has used its power to try to shape online discourse. According to meeting minutes and other records appended to a lawsuit filed by Missouri Attorney General Eric Schmitt, a Republican who is also running for Senate, discussions have ranged from the scale and scope of government intervention in online discourse to the mechanics of streamlining takedown requests for false or intentionally misleading information.
There is also a formalized process for government officials to directly flag content on Facebook or Instagram and request that it be throttled or suppressed through a special Facebook portal that requires a government or law enforcement email to use. At the time of writing, the “content request system” at is still live. DHS and Meta, the parent company of Facebook, did not respond to a request for comment. The FBI declined to comment.
To accomplish these broad goals, the report said, CISA should invest in external research to evaluate the “efficacy of interventions,” specifically with research looking at how alleged disinformation can be countered and how quickly messages spread. Geoff Hale, the director of the Election Security Initiative at CISA, recommended the use of third-party information-sharing nonprofits as a “clearing house for information to avoid the appearance of government propaganda.”

R: 3 / I: 5 / P: 5


UFO engine

R: 4 / I: 0 / P: 5

[BBC News] Enigma da síndrome de Havana, que ataca diplomatas americanos e intriga cientistas [Embed]

Espionagem Eletromagnética e Mandantes de Adélio Bispo

Quando o Presidente diz que "5G é usado para espionagem" e que "urnas são passível de fraude", ele está correto mas não sabe como apontar evidência. Eu sei e fornecerei um método experimental para que a Polícia Federal possa se convencer disso. Porém, não somente urnas, mas todos os computadores e celulares (os da União inclusos) são passíveis de interferência e não é apenas o 5G que é responsável por espionagem eletromagnética, mas silicon trojans implantados nas torres desde o 2G. Isso permite não só controlar os silicon trojans nós processadores, mas também é usado para causar a Síndrome de Havana que atinge pessoas pelo mundo.

O modo de espionagem sendo usado para manipular pessoas como o Adélio Bispo a cometer crimes é usado no Brasil por um grupo também responsável por sites de ódio como "Dogolachan" e mercados de drogas como "Nightmare Market". Porém eles são apenas usuários do sistema de espionagem, que também é usado internacionalmente. A tecnologia é americana mas não governamental. Como os dados obtidos com essa espionagem também abastece serviços automatizados de recomendação de propagandas e conteúdo (outro método de gerar dinheiro para eles), há uma abertura para demonstrar que sistemas não conectados a internet estão vazando informações através dessa espionagem eletromagnética.

Quando uma empresa como o NSO Group oferece o Pegasus, eles fazem uma demonstração para que fique claro que conseguem acessar dispositivos celulares. O que estou oferecendo é um modo de demonstrar a ocorrência de espionagem eletromagnética que obtém dados de todos os computadores de modo contínuo. Uma vez evidenciado isso, indícios dos crimes facilitados por essa espionagem ficarão crediveis.

R: 10 / I: 0 / P: 5

Best Vpn?

What's the best VPN in terms of:

Usable on windows/linux/mac

no logs

Accepts payment privately and doesn't log any payment details?

R: 19 / I: 2 / P: 5

Lenovo t420

am i making a good choice? just need something reliable and not fancy at all.

R: 6 / I: 0 / P: 5

So whonix + fully configured tor, what's the next levels to even higher security, /tech/?

R: 0 / I: 0 / P: 5

/tech/ hasn't been the same since 8ch went to shit. where did you go, anon?

R: 10 / I: 0 / P: 5

What is the best alternative to laundering the Bitcoin I have illegally earned?

Is there another way to turn my "dirty" Bitcoin into clean money without having to buy monero?

I'm talking about an 8 digit amount, any suggestions

R: 0 / I: 0 / P: 5

Alternative to Tornado Cash

Thought I would spread the word about a new privacy wallet that is integrated into Railgun. It's called Railway. It uses zk-snark proofs and works across any EVM capable chain. Imagine MetaMask, but if it had the ability to send 100% private transactions. That's what Railway is. Any ERC-20 or ERC-721 token can be transacted with with 100% anonymity.

R: 0 / I: 0 / P: 5

Anyone knows a working SIM swapping provider?

I found but it look scammy