Back

Shrijeet

Expect me!! • 6m

This isn't just a computer, it's a launchpad for thousands of payloads and exploits. Welcome to the mind of a 17y/o hacker #hacking

11 Replies
2
18
Replies (11)

More like this

Recommendations from Medial

Kalaiyarasan

Entrepreneur • 6m

💻 Hacking is Logic — Not Magic When we hear “hacking,” we imagine: "Guy in a dark room, typing fast, green code flying on screen" 👨‍💻 But the truth is, hacking is not some cinematic sorcery. It’s pure logic. Deep understanding. Precise thinking

See More
Reply
1
6

Sheikh Ayan

Founder of VistaSec:... • 6m

🔴 Red Teaming Tips & Tricks Red Teaming isn't just about hacking — it's about thinking like a threat actor and testing an organization’s detection, defense, and response capabilities. 🛠 1. Blend In with Normal Traffic Use tools like Cobalt Strike

See More
Reply
5
Image Description

Shrijeet

Expect me!! • 6m

Access granted. Target: Neutralized. Mission: Complete — with full permission from the owner. Welcome to the mind of a 17-year-old hacker. Expect me!

1 Reply
6

Ritesh gautam

Cyber Security Enthu... • 1y

Excited to kickstart my career in tech! With a degree in Computer Science and a diploma in Cybersecurity & Ethical Hacking, I'm eager to contribute my skills. Open to entry level opportunities in #Cybersecurity, #EthicalHacking, and more tech field.

See More
Reply
2
Image Description
Image Description

LIKHITH

"You never know" • 1y

Welcome to INGENIOUS MARKETING! EP=8 (Pepsi) Coke isn't a juice brand, it's demon 😂(Open img) Happy Hollowen ! Like and follow for more & What do you think 'bout this ?

7 Replies
1
12
Image Description

Eddie Jolley

Hey I am on Medial • 20d

Best Crypto Bitcoin Recovery Service | Best Crypto Asset Recovery Service Hire iFORCE HACKER RECOVERY  I spent a lot of time researching ways to recover stolen Bitcoin after I unexpectedly lost $120,000 during a trade. During my search, I came across

See More
1 Reply
6

Comet

#freelancer • 1y

What is Cryptojacking and How to Avoid It? Cryptojacking is when a hacker secretly uses your computer to mine cryptocurrency without your permission. This can happen when you're browsing the internet, watching a movie, or even when your computer i

See More
Reply
5

Sheikh Ayan

Founder of VistaSec:... • 1y

Boost Your Penetration Testing with These Top Burp Suite Extensions! Supercharge your security assessments with Burp Suite’s powerful extensions. Here are the top picks every ethical hacker needs: 1. JSON Beauty: Simplify and beautify complex JSON

See More
Reply
6

Download the medial app to read full posts, comements and news.