Skip to content
  • 0 Votes
    1 Posts
    8 Views
    XploitLKX
    Hey everyone As the community keeps growing, I’m looking for a few volunteer moderators who want to help keep this forum high-signal, welcoming, and useful for everyone interested in cybersecurity. This isn’t about power; it’s about building something solid together. What moderators will do Keep discussions respectful and on-topic Help reduce spam and low-effort posts Welcome new members and guide beginners Flag or handle rule violations when needed Share ideas to improve the community No heavy workload — just consistent presence. Who should apply You don’t need to be an expert, but you should: Be active in the forum Care about cybersecurity and learning Be respectful and fair (no gatekeeping) Communicate clearly and calmly Backgrounds welcome: Blue team / red team Students & beginners (yes, really) Professionals, hobbyists, career switchers Perks “Moderator” or “Founding Mod” badge Direct input on community rules & direction Recognition as someone helping build the forum early Resume/portfolio credibility (if you want it) How to apply Reply to this thread or DM me with: Your cybersecurity interests/background Why you want to help moderate Rough time availability (even a little is fine) If you care about keeping this space helpful and drama-free, we’d love to have you. Thanks for helping make this community better
  • 1 Votes
    2 Posts
    43 Views
    D
    Need to try this
  • Forum Rules & Guidelines 🔰

    Pinned until 04/01/2027, 02:57 Rules & Announcements
    1
    0 Votes
    1 Posts
    52 Views
    XploitLKX
    General Forum Rules 1. Respect & Professional Conduct Treat all members with respect and courtesy No harassment, bullying, discrimination, or personal attacks Disagree with ideas, not people - keep discussions constructive No hate speech, offensive language, or inappropriate content Respect different skill levels - we all started as beginners 2. Quality Content Use clear, descriptive thread titles Post in the appropriate category Search before posting to avoid duplicates Stay on topic within threads No spam, advertising, or self-promotion without moderator approval Use proper formatting and code blocks for technical content 3. Account & Privacy One account per person No impersonation of others or organizations Protect your own privacy - don't share sensitive personal information Respect others' privacy - no doxxing or sharing private information 4. Language & Communication English & Sinhala are the primary languages (unless in designated areas) Use proper grammar and spelling when possible Avoid excessive use of caps, emojis, or text speak No trolling, flame wars, or derailing discussions 5. Moderation Moderator decisions are final Report rule violations using the report button Don't mini-mod (backseat moderate) - let moderators handle issues Constructive feedback about the forum is welcome in Site Feedback Cybersecurity Ethical Guidelines 1. Legal Compliance All activities discussed must be legal in your jurisdiction Only perform security testing on systems you own or have explicit written permission to test Unauthorized access to computer systems is illegal and will result in immediate ban Do not discuss or facilitate illegal activities 2. Responsible Disclosure Follow responsible disclosure practices for vulnerabilities Do not publicly disclose unpatched vulnerabilities or zero-days Give vendors reasonable time to patch before disclosure (typically 90 days) Coordinate with security teams when reporting vulnerabilities 3. Prohibited Content Absolutely no posting of: Malware, viruses, ransomware, or malicious code designed to harm systems Working exploits for unpatched vulnerabilities Personal data obtained without authorization (passwords, credit cards, PII) Instructions for illegal hacking or unauthorized access Phishing kits, credential stuffers, or fraud tools Methods to bypass security for illegal purposes 4. Educational Purpose Only All security discussions must be for educational and defensive purposes Tools and techniques should be used to improve security, not compromise it When discussing offensive security, always emphasize ethical boundaries CTF writeups and lab exercises are encouraged 5. Vulnerability Discussion Guidelines You MAY discuss: Publicly disclosed CVEs with available patches Theoretical attack vectors for educational purposes Security research methodologies Defensive strategies and mitigations You MAY NOT share: Private exploits or proof-of-concept code for active threats Details that could enable attacks on unpatched systems Information about targets without their consent 6. Penetration Testing Ethics Always obtain written authorization before testing Define clear scope and rules of engagement Respect boundaries and stop if you find critical issues Report findings professionally and responsibly Do not access, modify, or delete data beyond what's necessary 7. Tool Usage Responsibility Security tools are dual-use - use them ethically Document legitimate use cases when sharing tools Warn about potential misuse implications Do not provide step-by-step instructions for malicious use 8. Data Handling Do not share leaked databases or stolen credentials Respect data privacy laws (GDPR, CCPA, etc.) Use sample/dummy data in examples and tutorials Properly anonymize any real-world examples Consequences for Rule Violations Warning System First Offense: Written warning and content removal Second Offense: Temporary ban (7-30 days) Third Offense: Permanent ban Immediate Permanent Ban Sharing malware or malicious code Posting illegal content Doxxing or sharing private information Coordinating illegal activities Creating multiple accounts to evade bans Serious Violations The following will be reported to appropriate authorities: Discussion or planning of illegal hacking Sharing exploits for critical infrastructure Child exploitation material Terrorism or violence planning Large-scale fraud schemes Best Practices for Community Members For Beginners Read the stickied posts in each section Use the search function before asking questions Provide context when asking for help Show what you've already tried Thank those who help you For Advanced Members Be patient with beginners Explain concepts, don't just give answers Share knowledge generously but responsibly Mentor others in their learning journey Lead by example in ethical conduct For Everyone Think before you post: Would this help or harm someone? Ask yourself: Is this legal and ethical? Remember: Everything you post is permanent and may be seen by future employers Stay curious: Security is always evolving - keep learning Give back: Help others as you've been helped Reporting Violations If you see content that violates these rules: Use the Report button on the post Provide specific details about the violation Do not engage with the violator Let moderators handle the situation For urgent security concerns or illegal activity: Contact moderators immediately via private message. Contact Moderators For questions about these rules or to appeal a moderation decision, contact the moderation team through: Private message to moderators Site Feedback section (for non-urgent matters) By participating in this forum, you agree to abide by these rules. Ignorance of the rules is not an excuse for violations. Last Updated: January 2026 These rules may be updated at any time. Check regularly for changes.