4544
Comments (69)
sorted by:
You're viewing a single comment thread. View all comments, or full comment thread.
11
CocaineRimJob 11 points ago +11 / -0

I'll write a GUI interface to access the hacker's computer

8
workinating 8 points ago +8 / -0

I'll inject the CSS with hex code algorithms to enhance the database!

7
MakeAmericaLegendary 7 points ago +7 / -0

“All I have to do is pivot through DHCP to buffer overflow the RSA server.”

2
CokeOrPepe 2 points ago +2 / -0

I thought it was just a bunch of tubes?

6
CocaineRimJob 6 points ago +6 / -0

enhance

ENHANCE ENHANCE ENHANCE

2
deleted 2 points ago +2 / -0
4
workinating 4 points ago +4 / -0

Isolate the node and dump them on the other side of the router!

RUN... HACK.EXE... ENDIF... METADATA... PORT SCAN... JPG...