CyberGuerrilla 2013
 Vol.3--No.2013 | 2 Users Online
Saturday,Feb 16,2019 
By Anonymous | November 19, 2013 - 23:54 | Posted in AnonyNews | 89 Comments | Post has the most Comments.

Greetings to the world! Here we are again – Anonymous Ukraine! The destiny of Ukraine is with Europe, not with Russia. Ukraine must free Yulia Timoshenko and sign the Association Agreement with the European Union. President Yanukovich and the ruling Party of Regions are doing everything to block the release Yulia Timoshenko and the signing Read more » 


By ro0ted | May 18, 2013 - 15:51 | Posted in /b/ | Comments Off on #ro0ted Grayhat Python: Python Programming 4 Hackers and Reverse Engineers

Download  


By Anonymous | July 28, 2013 - 04:47 | Posted in AnonyNews | Comments Off on NSA – Anonymous . Enough, elite. You are FINISHED.

Greetings NSA, Thanks to the actions of Edward Snowden the world is now aware of your absurdly intrusive and elaborate monitoring agenda. Every Verizon user. Every Facebook LinkedIn, Google+ and Twitter account. Every Yahoo!, Bing and Google search result. Every Microsoft Windows, Google Chrome and Apple Mac operating system. Every Safari, Chrome and Internet Explorer Read more » 


By Anonymous | July 26, 2013 - 03:11 | Posted in AnonyNews | 2 Comments

PLEASE READ THE DESCRIPTION FIRST! The video was made in teamwork by Anons around the world and its content belongs to the Internet. This is only an excerpt from the actions of Anonymous during 2012. The operations which are listed in the video are only examples, there are far more operations. Some of them still Read more » 


By Anonymous | July 22, 2013 - 22:59 | Posted in AnonyNews | 1 Comment

For all the newfags & famefags saying shit don’t matter. You obviously haven’t heard of??Agent Robert Smith yet, eh???http://pastebin.com/KRFe1GFH [This paste has been removed!]


By Anonymous | July 9, 2013 - 23:46 | Posted in AnonyNews | Comments Off on @MeltemArikan, is victim of a vicious smear campaign in Turkey.

We hear worrying reports that ours friends Memet Ali Alabora, Meltem Arikan, and Pinar Ogun who have been behind the first massively digital play Mi Minor are being the targets of vicious smear campaign by some newspapers. Read Meltem’s post on her website. This sounds like opportunists who have been waiting for an excuse to Read more » 


By Doemela | July 28, 2013 - 05:33 | Posted in CyberGuerrilla | Comments Off on Anarchists in the Turkish Uprising

An interview with anarchists in ??stanbul. They talk about the background of the revolt, the relationship between this uprising and others around the world, and its implications for the future of Turkey. What preexisting organizations have played a role in this new explosion of social struggle? The important thing about this rebellion is that there Read more » 


By ro0ted | July 28, 2013 - 04:33 | Posted in CyberGuerrilla | Comments Off on #ro0ted Hack Remote Windows PC using Apple Quicktime 7 Invalid Atom Length Buffer Overflow

This module exploits a stack buffer overflow in Cyber Link Power2Go version 8.x the vulnerability is triggered when opening a malformed p2g file containing an overly long string in the ???name??? attribute of the file element. This results in overwriting a structured exception handler record. Exploit Targets Apple Quicktime 7.7.3 Internet Explorer 8 Windows XP Read more » 


By ro0ted | July 27, 2013 - 11:56 | Posted in CyberGuerrilla | Comments Off on #ro0ted Big banks paid corrupt detectives to spy, hack and steal personal data in run-up to the financial crash

Global banks and big City institutions paid corrupt private detectives to carry out spying missions in Britain in the run-up to the financial crisis. International banking institutions dominate a list of 102 companies and named individuals who hired private investigators engaged in hacking, blagging and stealing private information. The revelations are a further blow to Read more » 


By ro0ted | July 27, 2013 - 11:28 | Posted in CyberGuerrilla | Comments Off on #ro0ted Computer researchers demonstrate how cars can by hacked via laptop

A team of computer security researchers recently demonstrated just how easy it is for malicious hackers to physically hijack a modern car using a laptop. By taking advantage of the computer hardware and software built into the automobile???s systems, researchers Chris Miller and Chris Valasek showed that they were able manipulate the displays on the Read more » 


nonymous. Whoever you are, we are ungovernable!
> =[]= This site is run by cyberguerrilla, your friendly anonymous autonomous tech collective since 2010 =[]= This the past that can NOT be changed! <