I can’t speak for anyone else, but I wouldn’t have a clue what to do. I’ve never done actual hacking before outside of once in a learning lab on a virtual machine where I sent a social engineered email to a controlled email address. But that’s not really hacking, let alone gonna be any use to a SiegedSec 2.0, now is it?
I mean… What’s stopping us, random Lemmy users, from making SiegedSec 2.0? If you want something done right, do it yourself.
I can’t speak for anyone else, but I wouldn’t have a clue what to do. I’ve never done actual hacking before outside of once in a learning lab on a virtual machine where I sent a social engineered email to a controlled email address. But that’s not really hacking, let alone gonna be any use to a SiegedSec 2.0, now is it?