Tumgik
#black hat hacking
technews-technology · 7 months
Text
How to hack betting website
Tumblr media
1 note · View note
camzverse · 1 month
Text
Tumblr media
been trying to make a rab design 💥 im going with the bottom one/s (2 different doodles but its the same design) Anyway do we fw my rab
ends of ears (+ maybe part of the hood idk havent decided yet) are black to represent black hat hacking ^_^ which if u dk just refers to hacking used in malicious criminal activity so like ggy ykyk
18 notes · View notes
prozac-shaped-urn · 11 months
Text
the more pics i see of gerri and deb side by side the more i want fanart to hang on my wall
so @hellpopgroove if ur in the Mood i welcome any and all ideas you have for GerriDeb art cuz like LOOK at this shit
Tumblr media
32 notes · View notes
whats-in-a-sentence · 20 days
Text
Like most people, I had no idea what to expect from a black-hat hacking course – learning to hack for illegal and malign purposes simply hadn't featured high on my list of priorities in life.
"Going Dark: The Secret Social Lives of Extremists" - Julia Ebner
2 notes · View notes
adamsheather81 · 1 year
Text
"Hacking Unveiled" – An Exploration into the Dark World of Cybercrime
Dive into the heart-pounding realm of hacking and cybercrime with “Hacking Unveiled.” This thrilling journey uncovers the mysterious world of hackers and their techniques, guiding you through the preventative measures you can take to safeguard yourself.
Discover the diverse types of hackers and their motivations, from ethical hackers to cyber criminals. Unveil the intricacies between “white hat” and “black hat” hackers, and learn how to become an ethical hacker yourself.
Enter into the infamous world of the “famous hackers and their stories” and the notorious “anonymous group and their attacks.” Get an inside look into the “hacking techniques used by cybercriminals” and the profound impact these actions have on businesses.
Get a sneak peek into the latest “hacking tools and software” used by both ethical hackers and cybercriminals, and delve into the subjects of “penetration testing” and “protecting against social engineering attacks.” Stay ahead of the game with the latest “hacking news and updates” and uncover the captivating “career opportunities in ethical hacking and cybersecurity.”
Be aware of the ever-evolving future of hacking and cyber threats. Let “Hacking Unveiled” guide you through the unknown, demystifying the complexities of cybercrime.
 White      Hat Hackers
Black      Hat Hackers
Anonymous
Gray      Hat Hackers
State-sponsored      Hackers
Hardware      Hackers
Crackers
The Spectrum of Cybercrime: Understanding the Different Types of Hackers
White Hat Hackers
White hat hackers, or “ethical hackers,” use their skills for good. They work alongside organizations, acting as “cybersecurity experts,” to identify and fix system vulnerabilities, protecting individuals and companies from cyber attacks.
Black Hat Hackers
In contrast, white and “black hat hackers” engage in illegal or malicious activities, such as stealing personal information, disrupting services, and spreading malware.
Anonymous
The loosely organized international group of hackers, “anonymous,” is known for participating in high-profile cyberattacks and spreading political messages.
Gray Hat Hackers
Sitting between white and black hat hackers, “gray hat hackers” may use their skills to identify vulnerabilities but exploit them for personal gain or to draw attention to the issue.
State-sponsored Hackers
The ominous “state-sponsored hackers” work on behalf of governments, using their skills for espionage or political sabotage, potentially significantly impacting national security and international relations.
Hardware Hackers
In addition to software hacking, there are also “hardware hackers,” who specialize in manipulating physical devices, such as breaking into intelligent homes or hacking into cars.
Crackers
A synonym for black hat hackers, “crackers” use their skills to crack into systems, software, or networks, gaining unauthorized access.
Cybercrime: Understanding Standard Techniques
To safeguard against malicious cyber attacks, knowing the most frequently employed tactics, including phishing scams, password attacks, and exploiting software vulnerabilities, is crucial. This post delves into the most prevalent hacking methods, from social engineering and phishing to malware and advanced persistent threats (APTs). Stay alert and ensure your software and security systems are always up-to-date to minimize the risk of falling victim to cybercrime.
Social Engineering: The Deceptive Tactic
Cybercriminals often resort to social engineering to manipulate individuals into divulging sensitive information or performing actions they wouldn’t otherwise. This tactic can take various forms, including phishing scams, pretexting, baiting, and more. To guard against these attacks, it is critical to be suspicious of unsolicited requests for personal data, be cautious when clicking on links or downloading attachments from unknown sources, and keep your software and security programs up-to-date.
Phishing: The Tricky Scam
Phishing is a form of social engineering that seeks to deceive individuals into surrendering confidential information, such as login credentials, financial details, or sensitive personal data. These scams often come in email or text messages, posing as credible sources. To avoid falling prey to phishing attempts, it is recommended to look out for suspicious messages, particularly those asking for personal information, verify the authenticity of links before clicking on them, and be wary of downloading attachments or clicking links from unknown sources.
Malware: The Harmful Threat
Malware, including viruses, trojans, and ransomware, is specifically designed to cause harm to computer systems. Installing and updating a reputable antivirus program is essential to protect your computer.
Additionally, be mindful of the files you download and links you click, especially if they are from unknown sources, as they may contain malware.
APTs: The Persistent Threat
Advanced persistent threats (APTs) are cyber attacks by state-sponsored hackers or highly-skilled cybercriminals. These attacks are known for their persistence as the attackers often go undetected for an extended period. To detect and fend off APTs, it is crucial to have an up-to-date antivirus program installed on your computer and to be cautious of unsolicited emails or text messages, especially those asking for personal information.
Defending Against Cyber Threats: Strategies for Keeping Your Data Safe
Essential Tactics to Outwit Hackers and Stay Secure  
Essential tactics to protect against cyberattacks include using robust passwords, safeguarding personal information, regularly updating software, and securing devices. These may sound simple, but neglecting to do so can have severe consequences.
The Importance of Strong Passwords and Up-to-Date Software Keeping software current helps to avoid vulnerabilities that older versions may have. Strong, unique passwords for each account can provide an easy yet effective layer of security.
Tips to Protect Personal Information and Devices Being mindful of phishing scams, using privacy settings on social media, and being prudent about what personal information is shared online are critical in securing personal information. Ensure devices are protected with a passcode or fingerprint and backup important files regularly.
Tumblr media
The Mysterious World of the Dark Web  
The dark web may sound like a concept from a hacker movie, but it’s real and can be a bit frightening. It’s crucial to understand what it is, how it differs from the regular web, and the type of activity. This article will shed some light on the enigmatic side of the internet.
Accessing the dark web requires special software and is invisible to the general internet user. It’s often linked to illegal activities, such as buying and selling illicit items, hacking services, and trafficking personal information. Exercise caution when accessing the dark web and take steps to protect personal information.
The dark web is a collection of websites that can only be accessed using specialized software, such as the Tor browser. Despite being often linked to illegal activities, not all its use is illicit.
However, accessing the dark web carries risks and can threaten personal information and security. Be cautious and take measures to protect personal data when accessing the dark web.
Why Access the Dark Web  
Accessing the dark web can be dangerous and threaten personal information and security. Exercise caution and take necessary measures to protect personal data when accessing the dark web.
How to Enter the Dark Web  
The most popular way to access the dark web is by using the Tor browser. It’s a free, open-source browser that routes traffic through multiple layers of encryption, making it challenging to trace activity. However, accessing the dark web comes with risks and requires using a VPN, never sharing personal information, and avoiding using real names.
Now that you have a better understanding of the dark web, the choice is to delve into the mysterious side of the internet.
Don’t Fall Victim: How to Protect Yourself from Identity Theft
Be Alert! Identity Theft Lurks, Stalking Unsuspecting Victims  
It’s a modern-day nightmare – cybercriminals prowling the internet, seeking out unsuspecting individuals and businesses to victimize through identity theft. From phishing scams to data breaches, the tactics used by these criminals are sophisticated and ever-evolving. The consequences of falling prey to such a crime can be devastating, leaving financial losses and a tarnished reputation in its wake.
Beware! Know Your Enemy.  
Cybercriminals use various methods to obtain personal information, including phishing scams, data breaches, dumpster diving, and even purchasing it on the dark web. Stay informed and take proactive measures to protect yourself and your information.
The Aftermath – A Life Turned Upside Down  
The impact of identity theft is far-reaching, affecting victims’ finances and reputation and often causing emotional stress as they work to regain control of their personal information.
Don’t Be a Statistic – Defend Yourself!  
Fortunately, you can take steps to safeguard yourself against identity theft. Regularly updating software, using strong and unique passwords, being cautious about sharing personal information, and remaining vigilant for unsolicited phone calls or emails are just a few examples.
Protect Your Information and Devices  
In addition to these basic measures, take extra steps to secure your personal information and devices. Keeping personal information offline, using anti-virus software and firewalls, encrypting sensitive data, and ensuring your devices with locks and PINs are crucial for maximum protection.
If Disaster Strikes – Have a Plan  
If you suspect you have fallen victim to identity theft, acting quickly is essential. Notify your bank, credit card companies, and credit reporting agencies to place a fraud alert on your accounts. Turn to resources such as the Federal Trade Commission’s IdentityTheft.gov and the Identity Theft Resource Center for guidance on reporting and recovering from the crime.
Stay Protected – Stay Vigilant  
Identity theft is a constant threat that requires ongoing attention and preventative measures. By staying informed, protecting yourself and your information, and knowing where to turn in the event of a breach, you can reduce your risk of falling victim to this malicious crime.
Stay Ahead of the Game – Subscribe to Our Blog!  
Remember to subscribe to our blog for more informative and helpful articles on cybersecurity and protecting yourself. Stay ahead of the game in the fight against identity theft!
This article is originally posted at https://nikolin.eu/tech/hacking-unveiled-a-fascinating-dive-into-the-world-of-cybercrime-and-its-prevention/
10 notes · View notes
sissytobitch10seconds · 9 months
Text
I have decided that if movies are going to refuse to elaborate about what kind of hacking people are doing to infiltrate an organization, then I am going to assume that they're just sending a lot of phishing emails.
4 notes · View notes
oh-dear-so-queer · 20 days
Text
In 2009, Weev hacked Amazon and temporarily deleted all gay and lesbian romance novels from the online shop, causing a billion-dollar fall in the company's stock price. The black-hat hacker said he wrote a script that helped him to find all gay- and lesbian-themed books. He then used invisible iFrames, which are normally used to insert advertisements into websites, to exploit the complaint feature on the Amazon website. This 'caused huge numbers of visitors to report gay and lesbian items as inappropriate without their knowledge', according to Weev.
"Going Dark: The Secret Social Lives of Extremists" - Julia Ebner
1 note · View note
kprince101smail · 5 months
Video
#WHAT IS ETHICAL HACKING? |Part 3 |#intro beginner |[HINDI] #एथिकल हैकर ...
0 notes
Text
0 notes
richdadpoor · 8 months
Text
Why The Chainsmokers Invest in—and Party With—Niche Cybersecurity Companies
On Saturday, with Hurricane Hilary looming, Alex Pall and Drew Taggart of the DJ duo The Chainsmokers performed a concert at Los Angeles State Historic Park that set an all-time attendance record for the venue. By Tuesday night, Pall was in Switzerland, speaking to WIRED on Zoom, but he had a different recent event on his mind: his and Taggart’s first-ever trip earlier this month to the Black Hat…
Tumblr media
View On WordPress
0 notes
camzverse · 1 month
Text
u ever start loving a character and then realize. Ughh of course this mf is your favorite u predictable little freak!!!!!!
1 note · View note
infosectrain03 · 8 months
Text
In today’s modern technology, we are using the internet extensively to meet our online needs. We indulge our sensitive data in our regular online resources such as banking information, mobile number, e-mail, and Aadhaar details to have a hassle-free browsing experience.
0 notes
digitalyogii · 9 months
Text
Security Update: A Recent Assault Exposes 95% Accurate Capture of Typed Content
In Las Vegas, the annual Black Hat and Defcon security conferences play host to hackers and researchers who unveil their latest discoveries. This year’s kickoff was particularly noteworthy. A researcher has presented potential evidence suggesting that spikes in radiation recorded by sensors at the Chernobyl nuclear facility following Russia’s 2022 invasion of Ukraine might have been manipulated.…
View On WordPress
1 note · View note
nuansea · 1 year
Text
👺
I'D RATHER GET KILLED
THAN LET YOU INVADE
MY PRIVATE SPACE,
NOT BEING ABLE TO KICK YOU OUT,
OR SEE YOUR TRUE FACE!
©
S. Y.
1 note · View note
nvuy · 1 month
Text
hijacked — boothill
summary. a mission to retrieve some files from a banquet hall goes wayward south when a galaxy ranger shows up to ruin your night—and score some bonus kisses while he’s at it.
notes. save me space cowboy… save me… remembered his entire body is robotic except his head. the possibilities to hack it and take over……….. ngh
HEY YOU!! there’s a sequel now.
warnings. little bit of threatening, mind control/hacking/hijacking? you take over his body for like a few minutes? is that a warning?
Tumblr media
“Hey, pretty thing.”
Target locked. Your scanners had already tracked him before you could even realise he was speaking to you.
You swiftly hid away the USB drive in your purse.
Did he know?
It seemed his own eye enhancements—although a lot less subtle than yours—were scanning you down as well. How transactional. You’d hoped the walls you’d put up were enough to keep whatever technology he had at bay. Or at least, not trigger any alarms.
“You looked lonely. Was g’nna buy you a drink. Help you loosen up a bit.” He swished his own drink in your face for good measure. The coupe glass in his hands looked odd. He didn’t seem like a cocktail man. Not at all.
He looked like a whiskey man. Hard whiskey. With ice. In a tumbler with ribbed glass. You could picture it.
He just looked so out of place at the banquet.
He wasn’t even following the dress code. He was wearing boots, and a pair of old pants with zips along the calves. A hat with a white feather woven into the fabric rested on a head of long white hair with splashes of black around his face.
“No thanks,” you said with a wave. You tried to discreetly scan down his body, searching for any sort of hint of how you could get into his system.
His pants and what little material of his jacket hid most of the metal of his body. Internally, you cursed at it. He had no clear openings in his neck or arms. His head seemed entirely organic.
No weak spots.
“N’aww. Shame.”
The front door felt a lot further away now. Even more so, knowing he was most definitely here for you. He hadn’t even introduced himself yet. You had a feeling he knew he didn’t need to.
“Was g’nna ask ya to dance.”
You laughed awkwardly. “I can’t dance in these shoes.”
“Take ‘em off. Who cares?” he bantered playfully. “I’ll watch out for ‘em if they’re expensive.”
“They’re priceless,” you quipped back. “All of me is.”
“Good. You know your worth.”
You were actually worth about fifteen million, as according to your wanted status by the IPC. You weren’t sure if this man was a part of them, though members of the IPC were always very adamant on letting you know that, yes, they did work at the IPC. It was usually the first thing that came out of their mouths.
Questioning if they actually worked at the IPC opened another entire can of worms.
You didn’t feel the need to ask. Not in that moment, at least.
“And what’s yours?” you asked him with a bat of your lashes.
He winked. “Guess.”
You smiled and scanned him down again. “Depends. I’d have to see what you’re made of.”
“Naughty.” He leaned back against the wall with you. “You sure you don’t want that drink? It’s a cosmopolitan.”
Very sure. You were convinced that he’d just taken the drink from one of the server’s trays. You couldn’t imagine he’d walked up to the bar and requested it for himself.
“You strike me as a whiskey man,” you eased. It came past your lips like butter.
He flashed his teeth in warning.
Then, he sipped his drink. “You’re good. Anything else you can read with your fancy eyes?”
You stopped short.
He did know. It wasn’t a surprise, not at all. He wasn’t entirely human. He must have been equipped with similar technology to realise just how advanced yours was.
You realised then with a shaky breath that you had the same vision enhancements as he did. An even match, unable to read through to each other.
He must have had so much more, too. You only had so many enhancements, whereas he was made almost entirely of metal. The thought of amount of different codings and technology he had crammed into every wire of his body gave you a headache.
Bad idea. You shouldn’t have provoked him. You needed to retreat. You needed to get home, preferably safely, with the USB stored nice and snug in your purse.
You tried not to let your nervousness show, but by the way he was staring at you, you knew he could read your face.
“That’s it, then. You’ve figured out my party trick.” You got up from the wall. “Thank you for the offer. The drink, I mean.” You cleared your throat. “I’ll be going now.”
“I’m not scaring you off, am I?” He got up off the wall too.
He hadn’t taken his eyes off of you.
“Not at all.” When you turned to face him, he was smiling so wide his eyes had crinkled. “Have a good night.”
“At least let me walk you out,” he insisted. He also offered to hold your purse, to which you quickly declined. That only made him smile impossibly wider. “What sort of man am I to not see a pretty thing like you get home safe?”
You headed towards the hallway, knowing he was right behind you.
The banquet was still in full swing, barely even close to ending. Most of the cast were drunk or getting there. Heels had been discarded, some missing their pair, skewed all over the dancefloor like glitter.
The golden chandelier in the main room was yet to be pulled from the ceiling. You were surprised nobody had tried to swing from it yet.
You dodged chattering groups and couples in the hallway—one of them had decided to put on a full display while right next to an unoccupied bedroom, right there in the centre of the hall.
Another one was gagging dangerously close to your feet.
You shouldered past them. “Stop following me, Ranger.”
“Don’t make this more difficult than it needs to be.” You felt his hair brush over your shoulder.
You knew he had a weapon. He wouldn’t have come to threaten you without one.
Before you could reach the door handle, he grabbed your wrist, pulled you backwards, and into the unoccupied guest room that the couple hadn’t bothered to take.
He shut the door with a loud slam, though not before hearing someone whistle out in the corridor.
Your head snapped towards him. He was leaning on the door, his arms crossed, looking almost unbothered.
“We can play this game all day, pumpkin. I got time.” He waved you off with a grin. “Give me the files. I’m askin’ nicely. I won’t force ya to hand ‘em over. Yet.”
You gritted your teeth.
You were so fucking close. So close to getting out of here, and then he had to come—this walking hunk of metal and scrap—and ruin everything.
Nothing ever went your fucking way anyway. You shouldn’t have been shocked something like this would happen.
You held your purse tightly in your hands. All of this was pointless. The dress, the heels, the hair, the nails, the makeup. All of it.
You just hoped by some miracle that he hadn’t found your locator beacon yet. You’d hidden it well; within the bushes outside away from anyone’s line of sight, but he wasn’t just anyone. He could see things a lot of people couldn’t.
“C’mon. You know you wanna…” He smiled sweetly for good measure. It looked like a threat. When he leaned to the side, the golden barrel of a gun flashed beneath his belt.
You could try to make a backup. Right then. You had what you needed in your watch. He’d probably stop you before it was complete.
Or…
Or what? What else could you do?
Your locator beacon wasn’t responding, though it hadn’t been broken. Most likely deactivated temporarily. You bounced on your heels.
You then formed the worst idea of your life.
With shaky hands, you walked towards him slowly. You reached into your purse, feeling for the cold plastic of the black USB he wanted to get his grubby hands on.
“Knew you’d come ‘round.” He held out his hand expectantly.
You fished the USB from your bag.
Then, before you could place it into his palm, you tripped and almost broke your nose on his torso. Your hands splayed desperately onto his chest to keep your face from shattering on impact.
He was quick to grab your arms to steady you with a surprised grunt.
There was a whirring sound, and then the sound of something mechanical and wrong. Foreign. Not from his body, but from yours.
The spaces beneath his joints lit up abright yellow for a moment before his hands loosened from your arms.
You grinned. Gotcha.
When you pulled back, he witnessed you pull a strange light from beneath his skin before you held it along your fingers.
When he blinked, you had an entire copy of his body in the palm of your hand. A hologram formed of his entire artificial makeup. Every crevice of his body, all of the metal that weaved to make him who he was.
All of it in your hand, with puppet strings attached.
It was missing just his head.
He froze. And then, he rushed out a simple, “what did you do?”
You tapped on his holographic arm on the screen. “Hijacked.”
When you moved it, his arm twitched to life.
Against his will, he pulled the gun from his holster and dropped it to the floor. It clattered uselessly onto the carpet.
He could only simply stare as his body moved against his will. There was no way to even twitch a finger with all his might.
It was like you had shut down all of his systems and replaced them with your own.
He should’ve seen this coming.
You whistled as you studied the model of him in your hands. When you tapped onto his neck, it zoomed in to show every single wire and thread of metal, as well as an accompanying string of coding.
“I don’t need any special enhancements to read you. What sort of cyborg comes in alone to try and stop me? You know who I am, don’t you?”
He wasn’t able to move his body. He said not a word.
“Somebody clearly doesn’t understand their body.” You patted his chest. His fans had kicked in. You could hear them whirring.
He was glaring at you.
“Did the IPC send you?”
After a moment, he scoffed. “Hardly. I don’t work for those… people.” It seemed like he wanted to say something else, but decided against it.
“Huh.” You didn’t think he was lying. “So… you’re not concerned about my bounty?”
“You said yourself you were priceless,” he countered easily. Despite his position, he was still grinning. “And besides, I’m sure my bounty is heaps bigger than yours.”
You almost snapped. He’d come to gloat, even at a disadvantage.
“You look better with your mouth shut,” you spat. You shoved the lining of code in his face for him to see, making the holographic blue screen as large as you possibly could. “I could make you tear yourself apart. I could make you forget who you are. I could alter whatever sort of brain you have in there. Watch yourself.”
Still glaring, but this time his lips sealed almost instantly.
You made him stand ram rod straight as you turned around, now eyeing a golden vanity next to the bed. The bedroom was surprisingly clean, save for a few empty glasses strewn about. No stains, no messes.
You sat down in the chair and angled the mirror so you could keep your eye on him.
You breathed out, trying not to stare at him for too long. You could feel your irritation growing, and it was showing on your face. If you stared at him for any longer, you feared you’d pull his limbs off with your own bare hands.
You fished out the powder from your purse and leaned closer to the mirror.
Maybe if you looked better, you’d feel better.
“You’re seriously dollin’ yourself up right now?” he asked, briskly annoyed.
You dabbed the sponge beneath your eyes. “Can’t let anyone think I let you put your hands on me. I have standards.”
He had nice hair. You weren’t sure if it was real, though. You weren’t sure if he could even grow hair. He was almost entirely artificial, save for his head.
He didn’t seem to age—his face, at least. You weren’t sure how old he was supposed to be, but his organic skin still looked fresh, as if left untouched and well taken care of.
Maybe it’s because that was all he had left of him.
You snapped the powder shut.
The ranger sneered. “Yeah, yeah. I’d beat you in a fight anyway.”
“‘Course you would,” you answered easily. You pulled a stick of gloss from your bag. You swiped the lipgloss over your lips, fixing it with the tip of your nail. “That’s not what I’m talking about, though.”
You stood from the chair, placing the gloss back in your purse.
“You’d never hit me, would you?”
His face almost lit up with fury.
It was absolutely hilarious.
“You’re so lucky I can't move,” he threatened. “You wouldn’t recognise your pretty face in the mirror.”
“Such a gentleman.” You stood on the tips of your toes to press your lips to his cheek. You hoped the sticky gloss bothered him, knowing he would be unable to wipe it off of him. You hoped it stained his milky skin a nice glittery bubblegum pink.
You hoped the scent of your perfume lingered on his skin, and he never forgot your name.
“Of course, gorgeous.” That same mocking tone. “Anything for you.”
You held the USB up to his lips. “Open.”
Begrudgingly, he did so.
You slipped the stick past his lips until his teeth caught onto the plastic and held it still.
“You can have it. I already got what I needed anyway.”
You kissed his other cheek for good measure, lingering for a moment before you pulled away. Two pink glittering stains on his face now; perfectly symmetrical.
“I’ll be thinking of you.” And that you would. You winked at him. “Bye, Boothill.”
Then, with sudden grid lines of yellow forming over your figure, the locator beacon buzzed to life, and you disappeared.
In the blink of an eye, you were outside in the cold night air. There were few people out in the front garden of the building, and none had spotted you.
You picked up the gadget and quickly left. A copy of his body and the USB were now a collection in your own personal belongings.
As soon as you vanished, Boothill regained control of his limbs and fell to the floor, trembling with the after effects of your invasion. His teeth were gritted as he pulled himself up onto the guest bed.
He spat the USB out before he could bite down and damage it.
He held it between his thumb and index finger.
There was a smear of your lipgloss on the side of the USB stick.
Mission accomplished, he supposed.
He also had two matching lipgloss stains on his skin as a trophy. He could see how stupid he looked in the vanity mirror.
He snickered with clenched, shaking fists.
You smelled like strawberry.
1K notes · View notes
deadghosy · 2 months
Note
I love your work so much imagine ben Drowned in hasbin hotel.
Them crawling out of the TV and alistor is like I don't like tv but can you mess with vox😭.
SURE!! LOL! 🦆💗If anyone wants to do a creepypasta! Reader, I will make it a fanon version cause that’s most easier since I’ve always seen the fanon side of creepypasta when I was into the fandom💗
HAZBIN HOTEL X BEN DROWNED! READER
prompt: after jumping into a tv to hide from being stabbed by Jeff…you accidentally went into a show called HAZBIN HOTEL……
Tumblr media
Your dumbass didn’t even check what was on tv…it was just left on as you are now falling to a city in a shape of a…..pentagram?
Welll shit…you are in a hell cartoon…
Meanwhile with Jeff: “where the fuck is that short tacked bitch…” he said holding his knife tightly as his eyes glanced at the tv. “That bastard!”
MEANWHILE WITH YOU: You pointed to a service pole and started to surge through the electrical wire into some random old tv box. You pressed your hand through the tv screen and came out of it. As you came out of it a gasp was heard to see a bunch of characters…..oh boy…
After basically getting chased around the hotel and interrogated…they let you stay by Charlie’s words as she was excited to have another member to her crew at last. 
Few weeks later, they have gotten use to you. I mean Alastor still keeps an eye on you as you play games and go through electronics around the place.
Angel thinks it’s funny for you to hack Valentino’s page to make his bio say “I have a small dick.”
Vaggie makes you go out on errands until she can find you a decent duty at least. But she appreciates how you help around a lot.
Husk thinks your pretty annoying because of your gen z & gen alpha humor. I headcannon ben and you to basically be a media specialist to learn the lingo around and to understand the generation.
“Hey husk…” “hey kid…” “you’re so not alpha male…” “…the fuck?” “Sooo not slay.” “Get the fuck out my face.” *cue you doing a gremlin ass laugh*
I can see Velvette making fun of you for wearing the link fit😭 she would be confused as if you were a stinky cosplayer kid-
“GOOD HELL?! What are you wearing dear..” the female vee says as you look down to your link outfit. “What’s wrong with it? I think I look ✨f a b u l o u s✨” you said with sass
“You look horrendous. THAT’S what you look like.” Velvette says. You rolled your eyes as she snapped her fingers giving you black converses, tan brown pants, and a green hoodie. She had let you keep your link hat as you actually liked how you looked.
Maybe when you get back to slender’s mansion you can spend his card to buy an outfit like this.
I imagine Charlie or niffty trying to wipe off the blood tears of your eyes thinking you were crying as you stand there like “what is going on-🤨” most definitely the face look like this “:T”
Angel dust brought you a gaming set from a thrift shop as you smiled happily at this and started to play….only to find out it had knock off versions of the games in the human world….impta?! (GTA) PENTACRAFT?! (Minecraft) hellmon?? (Pokémon)
You immediately thrown the gaming set outside and decided to go hack Vox’s system for fun again.
I can imagine reader sending random “if you don’t like this, Lucifer is coming for you.” posts to random sinner to fuck with them.
I can DEFINITELY see Alastor asking you to go mess with Vox’s tech even if he doesn’t like those picture boxes. “Ben/Reader, my fine fellow..I got a favor to ask of you.” After he asked you to go mess with this dude named Vox. You smiled as you transported into your own tv and go to the vee tower.
You hacked into Vox’s system as he spit his coffee out to see “nya cat” on all his computers and devices as you snicker seeing Vox’s face trying to fix it. You laughed showing yourself as your bloody tears roll down your face because of laughing. “WHO THE FUCK ARE YOU?!” Vox asked angrily
“IM YOU! BUT BETTER! GET HACKED LOSER!” You said before disappearing from his system as Vox claws his desk in anger.
Alastor had a good chuckle when you told him what you did. “I never liked this picture boxes…but you my friend, are true entertainment.” After this your relationship with Alastor grew as he would pay you handsomely with snacks as you go and piss Vox off on any other day.
Valentino and Vox hate your guys to the point they want to kill you while Velvette is just chill with you as she helps you with your outfits and aesthetics.
I imagine since Ben drowned also looks like link, you have long hair like link but sometimes cut it down to bit length to not trip on it.
You give off that “new worker at McDonald’s” vibes as you would just play around instead of helping the residents😭
“Can I have keycard?” “….how about no?”
I imagine you just tapping on and off a lamp post boredly as Valentino keeps going towards it and away from. “On….off…on…off…” you liked to mess with people
You had tapped on sir Pentious’s device once and it exploded…yeah you were pretty much banned from his room and lab. But it was worth it.
You definitely wrestle with husk as husk will just try to claw out your eyes only him to just get pepper sprayed by you.
“AGG MY FUCKIN' EYES!!” “I didn’t know this shit would work on demons..”
Lucifer was definitely intrigued with your appearance as you seemed like a human. But also had a demonic appearance. So he questioned you and you just kept saying “SWAG!” He got tired of it and demanded you as the ruler of hell.
It didn’t work as you just shrug with a “:D” face and transported into a wire. Lucifer was bamboozled as he just stood there like “what just happened”
You showed niffty how to beat any person during a game as you, yourself is a hacker and can beat any game personally.
You looked at the phone that you stole from that flat faced dude as you smirked having an idea as you transported into the phone to try and go find Jeff. And lucky you did as he was sitting on the couch watching wrestling.
“Heyyy buddy.” You said looking through the tv to see Jeff. He scoffed seeing that his favorite program was ruined by your face. Jeff turned off the tv. Your face was like a pikachu shocked face. “THAT BITC-”
1K notes · View notes