Forwarded from LegionLeaker๐ดโโ ๏ธ
Please open Telegram to view this post
VIEW IN TELEGRAM
Forwarded from LegionLeaker๐ดโโ ๏ธ
https://bpjs-kesehatan.go.id
Number of 800 thousand database columns
Please open Telegram to view this post
VIEW IN TELEGRAM
Please open Telegram to view this post
VIEW IN TELEGRAM
๐ฅChrome actively exploited 0-day vulnerability (CVE-2023-2033: type confusion in V8 engine, here fix)
๐คThx @hosselot
๐คThx @hosselot
Forwarded from pkg
SALE
Indonesian X company's Windows Servers For sale (Only In Indian 2 Rupee & ONLY for India govt ID holders & Australian Defence Personals)
- FULL COMPANY ACCESS. (You can co-relate brand to TOYOTA)
- Network Access to Equivalent Departments & joint ventures.
- A Separate Application Framework to Bind your Exploits into company APK, IPA Applications, You Can release the malformed application for Indonesian public from servers anytime in few seconds.
- Guarantee of Persistence access, even buyers loose the access upto 5years.
Only in 2 Rupee, Interested ones can email at Pakistan's ex foreign minister work email fop.portalteam@gmail.com, I will receive your Request.
Regards
pkg
Indonesian X company's Windows Servers For sale (Only In Indian 2 Rupee & ONLY for India govt ID holders & Australian Defence Personals)
- FULL COMPANY ACCESS. (You can co-relate brand to TOYOTA)
- Network Access to Equivalent Departments & joint ventures.
- A Separate Application Framework to Bind your Exploits into company APK, IPA Applications, You Can release the malformed application for Indonesian public from servers anytime in few seconds.
- Guarantee of Persistence access, even buyers loose the access upto 5years.
Only in 2 Rupee, Interested ones can email at Pakistan's ex foreign minister work email fop.portalteam@gmail.com, I will receive your Request.
Regards
pkg
โคโ๐ฅ4
Forwarded from Desidudewithsign
This media is not supported in your browser
VIEW IN TELEGRAM
๐ฅ2๐พ1
Forwarded from CrackCodes ๐ฎ๐ณ (Prapatti ็ชใๅ า)
Scan Vulnerabilities With Nmap: A Comprehensive Guide
If you want to conduct a vulnerability scan, you can use Nmap, which is a popular tool for the security testing process. Nmap is a powerful and versatile network scanning tool that lets you map out hosts and services on your network and provides valuable information to analyze for vulnerabilities.
Read Full Article: https://bit.ly/ScanVulnerabilitiesWithNmap
If you want to conduct a vulnerability scan, you can use Nmap, which is a popular tool for the security testing process. Nmap is a powerful and versatile network scanning tool that lets you map out hosts and services on your network and provides valuable information to analyze for vulnerabilities.
Read Full Article: https://bit.ly/ScanVulnerabilitiesWithNmap
Forwarded from CyberShieldX ๐ฎ๐ณ
Media is too big
VIEW IN TELEGRAM
๐๏ธ DogeRat Premium Subscription Available ๐๏ธ
โญ New Features โญ
๐๏ธ Screenshot
๐๏ธ Keylogger
๐๏ธ Gallery
๐๏ธ Clipboard
๐๏ธNew File Manager
-------------------------
And many features,check in video
๐๏ธ New features Added
๐๏ธ Bug fixed
๐๏ธ Persistence (work after removing from background or restarting the phone
๐๏ธ Smooth connection client to Bot
๐ @shivaya_dav
โญ New Features โญ
๐๏ธ Screenshot
๐๏ธ Keylogger
๐๏ธ Gallery
๐๏ธ Clipboard
๐๏ธNew File Manager
-------------------------
And many features,check in video
๐๏ธ New features Added
๐๏ธ Bug fixed
๐๏ธ Persistence (work after removing from background or restarting the phone
๐๏ธ Smooth connection client to Bot
๐ @shivaya_dav
Top Most Useful Pentesting Tools
Imagine youโre a cyber-security pro tasked with testing the security of a new companyโs website. You could manually sift through every line of code for vulnerabilities, but that would take ages. Instead, you use a suite of powerful tools designed specifically for penetration testing.
Read more: https://bit.ly/Toppentestingtools
Imagine youโre a cyber-security pro tasked with testing the security of a new companyโs website. You could manually sift through every line of code for vulnerabilities, but that would take ages. Instead, you use a suite of powerful tools designed specifically for penetration testing.
Read more: https://bit.ly/Toppentestingtools
๐1
Forwarded from ๐๐ง๐ค๐ฉ๐ค๐๐ค๐ก ๐๐๐๐
Here is an updated list of free cybersecurity certifications you can get to kickstart your career in cybersecurity :
1. Introduction to Cybersecurity[https://lnkd.in/gS4ncPmX]
2. Cybersecurity Essentials[https://lnkd.in/gSQqNY9h]
3. Introduction to Dark Web, Anonymity, and Cryptocurrency[https://lnkd.in/g8FSgRtH]
4. Ethical Hacking Essentials (EHE)[https://lnkd.in/gG4RgHA9]
5. Networking Essentials[https://lnkd.in/g6JMDGGe]
6. Website Hacking Techniques[https://lnkd.in/gUdjnpRW]
7. Digital Forensics Essentials (DFE)[https://lnkd.in/gkMpN--B]
8. Network Defense Essentials (NDE)[https://lnkd.in/gnvw7Fiy]
9. Android Bug Bounty Hunting: Hunt Like a Rat[https://lnkd.in/g76Jnzmi]
10. Certified in Cybersecurityโ - CC[https://lnkd.in/gB2fGdfC]
11. 20+ Free AWS Certs Related to Cybersecurity[https://lnkd.in/gfsqsQKz]
12. Cyber crime:[https://lnkd.in/gdiS-pqK]
13. Cyber Forensics:[https://lnkd.in/g22nfYaN]
14. Network Security:[https://lnkd.in/gXB4nTx5]
#infosec #cybersecurity #pentesting #ethicalhacking #informationsecurity #learningeveryday #networksecurity
1. Introduction to Cybersecurity[https://lnkd.in/gS4ncPmX]
2. Cybersecurity Essentials[https://lnkd.in/gSQqNY9h]
3. Introduction to Dark Web, Anonymity, and Cryptocurrency[https://lnkd.in/g8FSgRtH]
4. Ethical Hacking Essentials (EHE)[https://lnkd.in/gG4RgHA9]
5. Networking Essentials[https://lnkd.in/g6JMDGGe]
6. Website Hacking Techniques[https://lnkd.in/gUdjnpRW]
7. Digital Forensics Essentials (DFE)[https://lnkd.in/gkMpN--B]
8. Network Defense Essentials (NDE)[https://lnkd.in/gnvw7Fiy]
9. Android Bug Bounty Hunting: Hunt Like a Rat[https://lnkd.in/g76Jnzmi]
10. Certified in Cybersecurityโ - CC[https://lnkd.in/gB2fGdfC]
11. 20+ Free AWS Certs Related to Cybersecurity[https://lnkd.in/gfsqsQKz]
12. Cyber crime:[https://lnkd.in/gdiS-pqK]
13. Cyber Forensics:[https://lnkd.in/g22nfYaN]
14. Network Security:[https://lnkd.in/gXB4nTx5]
#infosec #cybersecurity #pentesting #ethicalhacking #informationsecurity #learningeveryday #networksecurity
Forwarded from ๐๐ง๐ค๐ฉ๐ค๐๐ค๐ก ๐๐๐๐
Here are some of the free websites to learn Linux from for free :
1. OverTheWire[https://lnkd.in/eFKK_85m]
2. Linux Journey[https://linuxjourney.com/]
3. Linux Handbook[https://linuxhandbook.com/]
4. Tecmint[https://www.tecmint.com/]
5. Linux Hint[https://linuxhint.com/]
6. LinuxOPsys[https://linuxopsys.com/]
7. Linuxize[https://linuxize.com/]
8. Eduonix Learn Linux From Scratch[https://lnkd.in/e7cHemyy]
9. Cyberciti Bash Shell Scripting Tutorial[https://lnkd.in/eNn5_9Gv]
10. Learn Enough Command Line To Be Dangerous[https://lnkd.in/eZimTYA4]
11. The Debian Administrator's Handbook[https://lnkd.in/exZzEwFS]
12. LabEx Linux For Noobs[https://lnkd.in/e_FPpdtz]
13. nixCraft[https://www.cyberciti.biz/]
14. Conquering the Command Line[https://lnkd.in/eHSc8Sza]
15. FOSS Linux[https://www.fosslinux.com/]
16. It's FOSS[https://itsfoss.com/]
17. Linux Survival[https://linuxsurvival.com/]
18. Ryan's Tutorials[https://lnkd.in/ePGx5PaC]
19. TLDP Advanced Bash Scripting Guide[https://lnkd.in/e4nzZmvV]
20. Guru99 Linux Tutorial Summary[https://lnkd.in/ebeJuzq8]
#pentesting #ethicalhacking #cybersecurity #learningeveryday #infosec #cybersec
1. OverTheWire[https://lnkd.in/eFKK_85m]
2. Linux Journey[https://linuxjourney.com/]
3. Linux Handbook[https://linuxhandbook.com/]
4. Tecmint[https://www.tecmint.com/]
5. Linux Hint[https://linuxhint.com/]
6. LinuxOPsys[https://linuxopsys.com/]
7. Linuxize[https://linuxize.com/]
8. Eduonix Learn Linux From Scratch[https://lnkd.in/e7cHemyy]
9. Cyberciti Bash Shell Scripting Tutorial[https://lnkd.in/eNn5_9Gv]
10. Learn Enough Command Line To Be Dangerous[https://lnkd.in/eZimTYA4]
11. The Debian Administrator's Handbook[https://lnkd.in/exZzEwFS]
12. LabEx Linux For Noobs[https://lnkd.in/e_FPpdtz]
13. nixCraft[https://www.cyberciti.biz/]
14. Conquering the Command Line[https://lnkd.in/eHSc8Sza]
15. FOSS Linux[https://www.fosslinux.com/]
16. It's FOSS[https://itsfoss.com/]
17. Linux Survival[https://linuxsurvival.com/]
18. Ryan's Tutorials[https://lnkd.in/ePGx5PaC]
19. TLDP Advanced Bash Scripting Guide[https://lnkd.in/e4nzZmvV]
20. Guru99 Linux Tutorial Summary[https://lnkd.in/ebeJuzq8]
#pentesting #ethicalhacking #cybersecurity #learningeveryday #infosec #cybersec
Linux Handbook
An independent, reader-supported publication focusing on Linux Command Line, Server, Self-hosting, DevOps and Cloud Learning
Forwarded from ๐๐ง๐ค๐ฉ๐ค๐๐ค๐ก ๐๐๐๐
Studying Active Directory?
Here are 5 blogs you should definitely check out.
1. https://lnkd.in/geyHTm_8
2. https://lnkd.in/g87pewRe
3. https://adsecurity.org/
4. https://dirkjanm.io/
5. https://lnkd.in/gcwsw-Nf
#pentesting #ethicalhacking #learningeveryday #infosec #cybersec #activedirectory
Here are 5 blogs you should definitely check out.
1. https://lnkd.in/geyHTm_8
2. https://lnkd.in/g87pewRe
3. https://adsecurity.org/
4. https://dirkjanm.io/
5. https://lnkd.in/gcwsw-Nf
#pentesting #ethicalhacking #learningeveryday #infosec #cybersec #activedirectory
lnkd.in
LinkedIn
This link will take you to a page thatโs not on LinkedIn
Forwarded from Maal Gf Randi Bhabhi chudai Desi
Free Web Application Pentesting Tools
โข Cyver Core
โข Zed Attack Proxy
โข W3af
โข Arachni
โข Wapiti
โข Metasploit
โข Vega
โข Grabber
โข SQLMap
โข Ratproxy
โข Wfuzz
โจ Follow : @HackingInsights
โข Cyver Core
โข Zed Attack Proxy
โข W3af
โข Arachni
โข Wapiti
โข Metasploit
โข Vega
โข Grabber
โข SQLMap
โข Ratproxy
โข Wfuzz
โจ Follow : @HackingInsights
Forwarded from CYBER DEMONS (INDIA๐ฎ๐ณ) ๐คCHANNEL๐ค
GUYS ๐ฅ๐ฅTOP 3 LAPTOPS UNDER 60000 FOR CODERS , HACKERS, AND GAMERS VIDEO IS LIVE NOW ,
GO AND WATCH THAT VIDEO BY JUST FOLLOWING THREE STEPS : STEP 1 = GO TO YOUR YOUTUBE APK , STEP 2 = SEARCH CYBER DEMONS INDIA , STEP 3 = ENJOY THE VIDEO LISTED ON MY
CHANNEL , OR FOLLOW THIS LINK BELOW : https://www.youtube.com/@CYBERDEMONSINDIA
|| BUT PLS UPAR WALA RASTA APNAOGE TO HELP HOJAYEGI |
LIKE AND SUBSCRIBE JRUR KRDENA๐๐ฅณ๐๐ฅโค๏ธ
GO AND WATCH THAT VIDEO BY JUST FOLLOWING THREE STEPS : STEP 1 = GO TO YOUR YOUTUBE APK , STEP 2 = SEARCH CYBER DEMONS INDIA , STEP 3 = ENJOY THE VIDEO LISTED ON MY
CHANNEL , OR FOLLOW THIS LINK BELOW : https://www.youtube.com/@CYBERDEMONSINDIA
LIKE AND SUBSCRIBE JRUR KRDENA๐๐ฅณ๐๐ฅโค๏ธ