Do you have a story to share?

Press ESC to close

9 Min Read

Lockheed Martin: Hacked!

Today a few members of our team are coming forward to the story of how they hacked into one of the most secretive and secured privately held businesses in the world. Aliens, hacking, and government secrets are all inbound and slated to release over the next weeks. We have it all, and you want proof, of course. You always put the burden of proof on us truthers, and someday we are going to take the time to tell you how one-sided and toxic this relationship is, but today we are just going to give you what you asked for. With a newly signed pact amongst our group, we have collectively decided to start sharing verifiable details on this site cautiously.

1 Min Read

Regular Expressions (“Regex”)

This is a quick explanation of a simple software term for anyone who is less inclined to read a Wikipedia explanation and prefers the explain-like-Im-five approach. Programmers rely on regular expressions (regex) to identify and parse patterns in text or other data. A regular expression allows a developer to specify a pattern and then run that pattern search over a payload and identify any matches. Most of the time, hackers use regex in the form of “grep” to find files on a computer through a console. Or when scraping websites or quickly sifting through a large amount of data.

3 Min Read

From Student to Mentor and Back

Some of the best advice I ever received was to always have a mentor throughout life. If you don’t have a mentor, then how intentional or accountable are you about seeking self-improvement and growth? I found my first business mentor at 17 working as a handyman for a successful entrepreneur, Mike. He had built his wealth over time through hard work and persistence. He had slowly worked his way up to 20 or so rental properties, and his full-time business was simply maintenance and improvement of his properties. He wasn’t content to sit on his ass and collect a check like most landlords. He believed that we can only grow if we continue to invest in ourselves. Mike taught me so much about who I wanted to be as an entrepreneur and helped me realize that I could achieve anything if I had the fortitude.

9 Min Read

Fort Ord, Gigling, and Die Glocke

Deep within the confines of Fort Ord, hidden from prying eyes, lies a mysterious facility known as “Gigling.” This secret facility played a pivotal role in the creation of many policies and tactics to control the American people in the event of existential threats. Many martial law strategies, programs such as FEMA, and alien-invasion simulations were invented at this facility. There are even rumors of secret programs and alien technology being revealed by cryptographers. Step into the shadows of Gigling and its origins with Die Glocke and learn about the hidden facility underneath the now-decommissioned base of Fort Ord.

5 Min Read

Maul the Sith Lord Hacker

In the world of hacking, labels such as black hat, grey hat, and white hat are often used to categorize hackers based on their activities. However, these terms fail to convey the true abilities and intentions of these individuals. When it comes to describing an elite hacker with malicious intent, I prefer to use the term “Sith Lords.” Among the few Sith Lords I’ve encountered, one stands out as particularly ruthless. For safety reasons, I won’t disclose his real name, but I will refer to him as Maul. Hailing from the Russian Mafia, he operates within a secretive network of brilliant minds driven by malicious intent and abundant resources. In this article, I will share my personal encounter with Maul, how I crossed paths with him, and the dangerous game that ensued.

12 Min Read

Secret Societies Hiding in Plain Sight

There are tens of thousands of embedded secrets hiding in plain sight across websites like 4chan. The deepest, darkest, and craziest shit is all ripe for picking if you’re willing to dig through the garbage of 4chan/b Random (NSFW). The average person probably wouldn’t be able to figure out WHY these secrets are posted in public and in the filth of pornographic or disturbing images, but the reasons are actually fairly trivial. By hiding messages in images ranging from revolting to illegal, hackers reduce the likelihood that some government spooks are going to browse our shit. If the requirement to decode content means staring at hardcore porn or gore for hours on end then that means the average person cannot or will not do so.

4 Min Read

Tony the Terrible

There’s something I’ve carried within me, a secret that has remained locked away, unspoken, until now. It’s a story of courage, justice, and the triumph of the underdog. In the depths of a company plagued by bullying and elitism, I found myself working under the tyrannical rule of a man named Tony. His reign of terror was shielded by company policies that prohibited electronic devices like cell phones and laptops in conference rooms. Our operations were deliberately analog, making it seemingly impossible to expose Tony’s true nature. To make matters worse, all the complaints to HR were ignored because the head of the department was Tony’s wife. But I was determined to bring about change, and I knew that I had to find a way to shatter the walls of silence.

2 Min Read

Subliminal Sway

As a seasoned freelancer in the realm of advertising, I have witnessed firsthand the intricate inner workings of the industry. However, there is a secret I have been harboring, a clandestine story that has left me uneasy and questioning the very nature of my profession. Brace yourself as I peel back the layers of this conspiracy, sharing my personal experience working on a covert project that involved embedding subliminal messages within a commercial for a beverage company, “Fizzola” for release in Romania (and I presume other countries).

2 Min Read

Positive Gatherings

In the midst of a turbulent year, where the tech industry has felt the ripples of the COVID-19 pandemic and unstable economic conditions, I found myself facing challenges and setbacks….

12 Min Read

Verse Us: Ponzi

In this Part 2, the true antagonists of the story come to light, compounding the red flags mentioned earlier and leading to the eventual downfall of Verse Us. If you thought Bryan at Fancy was bad, brace yourself for the incompetence and corruption of Derek, the CEO, and his sidekick, the COO. Unlike Bryan, who was merely incompetent, Derek and the COO displayed a complete lack of skills and moral integrity. This chapter will delve into the tale of bribery, blackmail, whistleblowing, and how it eventually entangled both the SEC and FBI.

15 Min Read

Verse Us: Pipe Dreams

Prepare yourself for an extraordinary journey through the realms of celebrity and deception, where fortunes hang in the balance. This story, drawn from the depths of my agency career, is an epic tale that will leave you spellbound. Brace yourself as I peel back the layers of this astonishing startup saga.

Millions of dollars were at stake, and the gravity of the situation was palpable. I witnessed firsthand the sheer magnitude of mismanagement, as key players stumbled through their roles with alarming ineptitude. From strategic decision-making to execution, it seemed as though chaos reigned supreme. Yet, amidst this chaos, I held on to the hope that redemption was possible.