Forwarded from Maal Gf Randi Bhabhi chudai Desi
Top 7 Google Dorks You Need to Know
๐ Cache : This dork will show you the cached version of any website.
โข cache : exampleโข com
๐ After : This dork will give you result after like :
โข After : 2019, After : 2016 ( Use with Site Dork )
๐ Allintext : Searches for specific text contained on any web page.
โข allintext : admin
๐ Allinurl : exactly the same as allintext, but will show pages that contain titles with "X" characters.
โข allinurl : "password"
๐ Anchor Tag : this is useful when you need to search for an exact anchor text used on any links.
โข "Some_Text" Filetype : php
โจAnother dork that Works like same as filetype is ext :
โข "python" ext : pdf
๐ Allinurl : It can be used to fetch results whose URL contains all the specified characters.
โข allinurl :"login"
๐ Learn how to hack with Google Dorks (Free Guide)
๐ https://pentestingguide.com/google-dorks/
Join for more
โ๏ธ @HackingInsights โ๏ธ
๐ Cache : This dork will show you the cached version of any website.
โข cache : exampleโข com
๐ After : This dork will give you result after like :
โข After : 2019, After : 2016 ( Use with Site Dork )
๐ Allintext : Searches for specific text contained on any web page.
โข allintext : admin
๐ Allinurl : exactly the same as allintext, but will show pages that contain titles with "X" characters.
โข allinurl : "password"
๐ Anchor Tag : this is useful when you need to search for an exact anchor text used on any links.
โข "Some_Text" Filetype : php
โจAnother dork that Works like same as filetype is ext :
โข "python" ext : pdf
๐ Allinurl : It can be used to fetch results whose URL contains all the specified characters.
โข allinurl :"login"
๐ Learn how to hack with Google Dorks (Free Guide)
๐ https://pentestingguide.com/google-dorks/
Join for more
โ๏ธ @HackingInsights โ๏ธ
Scan Vulnerabilities With Nmap: A Comprehensive Guide
If you want to conduct a vulnerability scan, you can use Nmap, which is a popular tool for the security testing process. Nmap is a powerful and versatile network scanning tool that lets you map out hosts and services on your network and provides valuable information to analyze for vulnerabilities.
Read Full Article: https://bit.ly/ScanVulnerabilitiesWithNmap
If you want to conduct a vulnerability scan, you can use Nmap, which is a popular tool for the security testing process. Nmap is a powerful and versatile network scanning tool that lets you map out hosts and services on your network and provides valuable information to analyze for vulnerabilities.
Read Full Article: https://bit.ly/ScanVulnerabilitiesWithNmap
Forwarded from CYBER TRICKS ZONE ๐ฎ๐ณ๐ฉ (๐๐ง๐ค๐ฉ๐ค๐๐ค๐ก ๐๐๐๐ )
ALL WEBSITES THAT OFFERS YOU RDP / VPS FOR FREE
https://sadd.io/
http://vpswala.org/
https://www.ihor.ru/
https://www.vultr.com/
https://gratisvps.net/
https://www.skysilk.com/
https://yellowcircle.net/
https://vps.apponfly.com/
https://www.ctl.io/free-trial/
https://www.cloudsigma.com/
http://ezywatch.com/freevps/
https://www.apponfly.com/en/
https://www.digitalocean.com/
https://my.letscloud.io/sign-up/
https://developer.rackspace.com/
http://ohosti.com/vpshosting.php
https://www.neuprime.com/l_vds3.php
https://www.ionos.com/enterprise-cloud
https://sadd.io/
http://vpswala.org/
https://www.ihor.ru/
https://www.vultr.com/
https://gratisvps.net/
https://www.skysilk.com/
https://yellowcircle.net/
https://vps.apponfly.com/
https://www.ctl.io/free-trial/
https://www.cloudsigma.com/
http://ezywatch.com/freevps/
https://www.apponfly.com/en/
https://www.digitalocean.com/
https://my.letscloud.io/sign-up/
https://developer.rackspace.com/
http://ohosti.com/vpshosting.php
https://www.neuprime.com/l_vds3.php
https://www.ionos.com/enterprise-cloud
vpswala
Free VPS Server Hosting 24/7 | No Credit Card Required
Get 100% Free VPS Server Hosting with AMD EPYC processors, NVMe SSD storage, full root access on Windows & Linux. No credit card โ deploy in 60 seconds.
๐ฅ๐ฅ๐ฅSBX in vm2 ( CVE-2023-29017 )
vm2 was not properly handling host objects passed to Error.prepareStackTrace in case of unhandled async errors.
โ ๏ธA threat actor can bypass the sandbox protections to gain RCE rights on the host running the sandbox.
Exploits:- https://system32.ink/news-feed/p/288/
vm2 was not properly handling host objects passed to Error.prepareStackTrace in case of unhandled async errors.
โ ๏ธA threat actor can bypass the sandbox protections to gain RCE rights on the host running the sandbox.
Exploits:- https://system32.ink/news-feed/p/288/
๐3
๐ Best WiFi Adapters for Hacking ๐
Here we have listed some best USB Wireless adapters Kali Linux in 2023. These WiFi adapters are 100% compatible with Kali Linux and supports monitor mode and packet injection, which will help a lot in WiFi penetration testing.
๐ฅLink -> https://pentestingguide.com/wifi-adapter-for-hacking/
Here we have listed some best USB Wireless adapters Kali Linux in 2023. These WiFi adapters are 100% compatible with Kali Linux and supports monitor mode and packet injection, which will help a lot in WiFi penetration testing.
๐ฅLink -> https://pentestingguide.com/wifi-adapter-for-hacking/
๐4
OSCP guide 2023
All the advices that worked for me might not work for you.
Pick what you like, throw what you donโt.
Read Full Article: https://bit.ly/OSCPGuide2023
All the advices that worked for me might not work for you.
Pick what you like, throw what you donโt.
Read Full Article: https://bit.ly/OSCPGuide2023
๐ฅ How to Start Bug Bounty for Beginners ๐ฅ
๐ Topics Covered ๐
โ Introduction
โ Advantages of bug bounty
โ Steps to become bug hunter
โ Scope of bug bounty
โ Skills required to become bug hunter
โ Tools required for bug hunting
โ Common vulnerabilities in bug hunting
โ Reporting & Communication best practices
โ Legal and Ethical Considerations
โ Finding and joining bug bounty programs
โ Tips & tricks for succeeding in bug bounty
๐ Link : https://bit.ly/3nPrJrK
Share if you found it helpful โค๏ธ
๐ Topics Covered ๐
โ Introduction
โ Advantages of bug bounty
โ Steps to become bug hunter
โ Scope of bug bounty
โ Skills required to become bug hunter
โ Tools required for bug hunting
โ Common vulnerabilities in bug hunting
โ Reporting & Communication best practices
โ Legal and Ethical Considerations
โ Finding and joining bug bounty programs
โ Tips & tricks for succeeding in bug bounty
๐ Link : https://bit.ly/3nPrJrK
Share if you found it helpful โค๏ธ
๐1
AWS Well-Architected Labs
https://dx1572sre29wk.cloudfront.net/security/
#bugbounty #infosec #hacking #pentesting
https://dx1572sre29wk.cloudfront.net/security/
#bugbounty #infosec #hacking #pentesting
๐2
Fuzzing The Web For Mysterious Bugs
It all starts with unexpected input. Modern applications and APIs rely on validation, sanitization, and normalization. This is usually done by custom regular expressions and widely used libraries that validate and transform typical user input formats, such as email addresses, URLs, and more.
Read Full Article: https://bit.ly/FuzzTheWeb
It all starts with unexpected input. Modern applications and APIs rely on validation, sanitization, and normalization. This is usually done by custom regular expressions and widely used libraries that validate and transform typical user input formats, such as email addresses, URLs, and more.
Read Full Article: https://bit.ly/FuzzTheWeb
๐2
Forwarded from LegionLeaker๐ดโโ ๏ธ
Please open Telegram to view this post
VIEW IN TELEGRAM
Lightshot
Screenshot
Captured with Lightshot
Forwarded from LegionLeaker๐ดโโ ๏ธ
Please open Telegram to view this post
VIEW IN TELEGRAM
Lightshot
Screenshot
Captured with Lightshot