๐ก ๐พ๐ก๐๐๐ ๐๐๐๐ ๐๐ฃ๐ & ๐พ๐ค๐ฃ๐ฉ๐๐ฃ๐ฉ ๐๐ฃ๐๐๐๐ฉ๐๐ค๐ฃ ๐๐ช๐ก๐ฃ๐๐ง๐๐๐๐ก๐๐ฉ๐ฎ ๐ก
Clickjacking Tool, Script are given in Description.
๐๐ก๐๐๐จ๐ ๐๐๐ ๐ & ๐๐ช๐๐จ๐๐ง๐๐๐ ๐ฉ๐ค ๐ค๐ช๐ง ๐๐ค๐ช๐๐ช๐๐ ๐๐๐๐ฃ๐ฃ๐๐ก๐
๐๐๐ฃ๐ : https://youtu.be/gbpVPv3aT18
Clickjacking Tool, Script are given in Description.
๐๐ก๐๐๐จ๐ ๐๐๐ ๐ & ๐๐ช๐๐จ๐๐ง๐๐๐ ๐ฉ๐ค ๐ค๐ช๐ง ๐๐ค๐ช๐๐ช๐๐ ๐๐๐๐ฃ๐ฃ๐๐ก๐
๐๐๐ฃ๐ : https://youtu.be/gbpVPv3aT18
YouTube
04 Clickjacking & Content Injection
๐ด BE MY FRIEND
๐๐๐ฃ๐จ๐ฉ๐๐๐ง๐๐ข (thecybertix): https://www.instagram.com/thecybertix
๐๐๐ฌ๐๐ฉ๐ฉ๐๐ง: https://twitter.com/thecybertix
๐๐๐๐ฃ๐ ๐๐๐๐ฃ: https://www.linkedin.com/company/cybe...
๐๐๐๐๐จ๐๐ฉ๐: https://cybertix.in
๐ด RESOURCES
๐๐พ๐ก๐๐๐ ๐ ๐๐๐ ๐๐ฃ๐ ๐๐ค๐ค๐ก: https://cybโฆ
๐๐๐ฃ๐จ๐ฉ๐๐๐ง๐๐ข (thecybertix): https://www.instagram.com/thecybertix
๐๐๐ฌ๐๐ฉ๐ฉ๐๐ง: https://twitter.com/thecybertix
๐๐๐๐ฃ๐ ๐๐๐๐ฃ: https://www.linkedin.com/company/cybe...
๐๐๐๐๐จ๐๐ฉ๐: https://cybertix.in
๐ด RESOURCES
๐๐พ๐ก๐๐๐ ๐ ๐๐๐ ๐๐ฃ๐ ๐๐ค๐ค๐ก: https://cybโฆ
๐1
How Search Engines Help Us In Bug Bounty
Passive reconnaissance plays an important role in the approach of a target. In comparison to active reconnaissance, passive reconnaissance is the silent, stealthy one, where the attacker doesnโt interact with the target. Instead, they obtain information about the target from other external, third-party sources.
Read Full Article: https://bit.ly/Search_engine_For_Bug_Bounty
@crackcodes
Passive reconnaissance plays an important role in the approach of a target. In comparison to active reconnaissance, passive reconnaissance is the silent, stealthy one, where the attacker doesnโt interact with the target. Instead, they obtain information about the target from other external, third-party sources.
Read Full Article: https://bit.ly/Search_engine_For_Bug_Bounty
@crackcodes
โค3
Forwarded from Tสษชแดแดส Pแดษดษขแดษชษด ( trickypenguin.ink )
[ cPanel CVE-2023-29489 ]
==========================
Finding XSS in a million websites (cPanel CVE-2023-29489)
READ ARTICLE
==========================
[ Telegram Channel : @trickypenguin ]
[ Website : trickypenguin.ink ]
[ Share & Support ]
==========================
==========================
Finding XSS in a million websites (cPanel CVE-2023-29489)
READ ARTICLE
==========================
[ Telegram Channel : @trickypenguin ]
[ Website : trickypenguin.ink ]
[ Share & Support ]
==========================
โคโ๐ฅ5โค2
Forwarded from INDIAN CYBER MAFIA
Forensic Science Laboratory KP Police Govt. Of Pakistan Hacked
https://rfslswat.gov.pk
https://mail.rfslswat.gov.pk
https://school.rfslswat.gov.pk
Jai Hind
https://rfslswat.gov.pk
https://mail.rfslswat.gov.pk
https://school.rfslswat.gov.pk
Jai Hind
๐ฅ6๐1๐1
Opportunity Update :
We are in search of Talented Guys who have skillset of
: Making Crypters
: Making FUD Trojans
: Doing Reverse Engineering
: Making Decompilers
Dm or send your Resume to Infosecpawan@gmail.com asap .
________
INDIANS ONLY...
We are in search of Talented Guys who have skillset of
: Making Crypters
: Making FUD Trojans
: Doing Reverse Engineering
: Making Decompilers
Dm or send your Resume to Infosecpawan@gmail.com asap .
________
INDIANS ONLY...
๐2๐1
๐คฉ10 Best FREE Ethical Hacking Courses๐คฉ
With the increasing demand for skilled professionals to protect against cyber threats, taking a hacking course can be a valuable investment.
This blog will provide a list of the 10 best hacking courses for individuals interested in cybersecurity and improving their hacking skills.
Download: bit.ly/BestHackingCourses
Share & Support โค๏ธ
With the increasing demand for skilled professionals to protect against cyber threats, taking a hacking course can be a valuable investment.
This blog will provide a list of the 10 best hacking courses for individuals interested in cybersecurity and improving their hacking skills.
Download: bit.ly/BestHackingCourses
Share & Support โค๏ธ
Forwarded from LegionLeaker๐ดโโ ๏ธ
Please open Telegram to view this post
VIEW IN TELEGRAM
Please open Telegram to view this post
VIEW IN TELEGRAM
Forwarded from LegionLeaker๐ดโโ ๏ธ
Please open Telegram to view this post
VIEW IN TELEGRAM
https://medium.com/@lonewarriorco/mastering-osint-the-ultimate-guide-to-investigating-and-analyzing-publicly-available-information-370f265699da
In this blog I have mentioned:-
1.What truly osint stands for
2. Difference between Digital Forensics and OSint
3. The correct approach for osint
4. Place to learn the techniques of OSint
5. Jobs where osint is used as a skill
This may be helpful for both intermediate and beginners.
also suggest me for any edits.
In this blog I have mentioned:-
1.What truly osint stands for
2. Difference between Digital Forensics and OSint
3. The correct approach for osint
4. Place to learn the techniques of OSint
5. Jobs where osint is used as a skill
This may be helpful for both intermediate and beginners.
also suggest me for any edits.
Medium
Mastering OSINT: The Ultimate Guide to Investigating and Analyzing Publicly Available Information
Welcome to my blog! Today, weโll discuss OSINT, sometimes known as open-source intelligence. People frequently link employing various toolsโฆ
๐1
Forwarded from Tสษชแดแดส Pแดษดษขแดษชษด ( trickypenguin.ink )
5 Common Web Application Vulnerabilities and How to Test for Them
READ full Article
bit.ly/3oQ4RsT
@trickypenguin
Share & Support ๐
READ full Article
bit.ly/3oQ4RsT
@trickypenguin
Share & Support ๐
โค4
๐ค How to Write Bug Bounty Report ๐ค
Writing a clear and concise bug bounty report is crucial for helping developers identify and fix vulnerabilities.
In this article, we'll explore the key steps involved in writing a successful bug bounty report. We'll cover everything from providing a clear summary and detailed instructions to including supporting evidence and maintaining a professional tone.
By the end of this article, you'll have the knowledge you need to write a bug bounty report that helps keep software secure and reliable.
โ Link: bit.ly/BugBountyReport
Share & Support โค๏ธ
Writing a clear and concise bug bounty report is crucial for helping developers identify and fix vulnerabilities.
In this article, we'll explore the key steps involved in writing a successful bug bounty report. We'll cover everything from providing a clear summary and detailed instructions to including supporting evidence and maintaining a professional tone.
By the end of this article, you'll have the knowledge you need to write a bug bounty report that helps keep software secure and reliable.
โ Link: bit.ly/BugBountyReport
Share & Support โค๏ธ
๐4
What To Do If Your PC Got Infected With Malware?
Malware, short for malicious software, is a type of software designed to harm computer
systems and networks. Malware can cause various degrees of damage, from minor inconvenience
to severe system failure.
Read Full Article: https://system32.ink/what-to-do-if-your-pc-got-infected-with-malware/
Malware, short for malicious software, is a type of software designed to harm computer
systems and networks. Malware can cause various degrees of damage, from minor inconvenience
to severe system failure.
Read Full Article: https://system32.ink/what-to-do-if-your-pc-got-infected-with-malware/
Watch latest movies and Get Free Courses on https://neplix.stream
Features of Neplix
1. Free Movies
2. Less Ads
3. Free Courses
4. Request for Movies
https://neplix.stream/courses
Features of Neplix
1. Free Movies
2. Less Ads
3. Free Courses
4. Request for Movies
https://neplix.stream/courses
Forwarded from CrackCodes ๐ฎ๐ณ (Prapatti ็ชใๅ า)
GraphQL For Pentesters
Iโll showcase several GraphQL vulnerabilities and attacks, how they work and how to exploit them as well as illustrations with POCs.
Read Full Article: https://bit.ly/GraphQLForPentesters
@crackcodes @Mynk0x00
Iโll showcase several GraphQL vulnerabilities and attacks, how they work and how to exploit them as well as illustrations with POCs.
Read Full Article: https://bit.ly/GraphQLForPentesters
@crackcodes @Mynk0x00
๐ด Don't Miss These Tutorials! (FREE)
๐ CTF for Beginners: Get Started
๐ bit.ly/CTFforBeginners
๐ Best CTF Challenges for Beginners
๐ bit.ly/CTFChallenges
๐ How to Prepare for CTF to Succeed
๐ bit.ly/PrepareForCTF
(Note: Click on First Website)
Just React & Make us Happy โบ๏ธ
๐ CTF for Beginners: Get Started
๐ bit.ly/CTFforBeginners
๐ Best CTF Challenges for Beginners
๐ bit.ly/CTFChallenges
๐ How to Prepare for CTF to Succeed
๐ bit.ly/PrepareForCTF
(Note: Click on First Website)
Just React & Make us Happy โบ๏ธ
๐2โคโ๐ฅ1๐ป1