Forwarded from CrackCodes ๐ฎ๐ณ (Prapatti ็ชใๅ า)
GraphQL For Pentesters
Iโll showcase several GraphQL vulnerabilities and attacks, how they work and how to exploit them as well as illustrations with POCs.
Read Full Article: https://bit.ly/GraphQLForPentesters
@crackcodes @Mynk0x00
Iโll showcase several GraphQL vulnerabilities and attacks, how they work and how to exploit them as well as illustrations with POCs.
Read Full Article: https://bit.ly/GraphQLForPentesters
@crackcodes @Mynk0x00
๐ด Don't Miss These Tutorials! (FREE)
๐ CTF for Beginners: Get Started
๐ bit.ly/CTFforBeginners
๐ Best CTF Challenges for Beginners
๐ bit.ly/CTFChallenges
๐ How to Prepare for CTF to Succeed
๐ bit.ly/PrepareForCTF
(Note: Click on First Website)
Just React & Make us Happy โบ๏ธ
๐ CTF for Beginners: Get Started
๐ bit.ly/CTFforBeginners
๐ Best CTF Challenges for Beginners
๐ bit.ly/CTFChallenges
๐ How to Prepare for CTF to Succeed
๐ bit.ly/PrepareForCTF
(Note: Click on First Website)
Just React & Make us Happy โบ๏ธ
๐2โคโ๐ฅ1๐ป1
๐จ๐ปโ๐ปPenetration Tester Full Roadmap๐จ๐ปโ๐ป
If you want to become a penetration tester or an ethical hacker then you should not miss this post!
What you'll know?
โ How to become ethical hacker
โ Salary of ethical hacker
โ Certifications required to become hacker
โ Skills required to become hacker
โ Do you need a degree or not
๐Link: bit.ly/PentesterRoadmap
Share and Support usโฅ๏ธ
If you want to become a penetration tester or an ethical hacker then you should not miss this post!
What you'll know?
โ How to become ethical hacker
โ Salary of ethical hacker
โ Certifications required to become hacker
โ Skills required to become hacker
โ Do you need a degree or not
๐Link: bit.ly/PentesterRoadmap
Share and Support usโฅ๏ธ
Buffer Overflow to RCE Root Shell
@crackcodes
Buffer overflows were an earth-shattering vulnerability exploited in the late 1980โs that are protected against on modern systems. That said, they are still relevant, and pave the way to learning more advanced exploits.Read Full Article: https://bit.ly/BOF_to_RCE
@crackcodes
๐จOne of the Best Payment Gateway in Pakistan is down๐
https://jazzcash.com.pk
https://check-host.net/check-report/fbd627ek6e1
#4n0nym0us_gh0st
#Nwhsecurity
#indiancyberforce
#IndianCyberCrew
#UnknownCyberCult
#indiancybermafia
#KeralaCyberXtractor
#DarknetAssociation
#BLACK_DRAGON_SEC
#oppakistan
https://jazzcash.com.pk
https://check-host.net/check-report/fbd627ek6e1
#4n0nym0us_gh0st
#Nwhsecurity
#indiancyberforce
#IndianCyberCrew
#UnknownCyberCult
#indiancybermafia
#KeralaCyberXtractor
#DarknetAssociation
#BLACK_DRAGON_SEC
#oppakistan
๐7โคโ๐ฅ1
๐ฝ๐ช๐ ๐๐ฎ๐ฅ๐ : Reflected XSS
๐๐ก๐๐๐จ๐ ๐จ๐ช๐๐จ๐๐ง๐๐๐ ๐ฉ๐ค ๐ค๐ช๐ง ๐๐ค๐ช๐๐ช๐๐ ๐๐๐๐ฃ๐ฃ๐๐ก๐
๐พ๐ค๐ช๐ง๐จ๐ ๐๐๐ฃ๐ : https://youtu.be/NOmEO5GsS7w
โบ๏ธ๐
๐๐ก๐๐๐จ๐ ๐จ๐ช๐๐จ๐๐ง๐๐๐ ๐ฉ๐ค ๐ค๐ช๐ง ๐๐ค๐ช๐๐ช๐๐ ๐๐๐๐ฃ๐ฃ๐๐ก๐
๐พ๐ค๐ช๐ง๐จ๐ ๐๐๐ฃ๐ : https://youtu.be/NOmEO5GsS7w
โบ๏ธ๐
YouTube
05 Reflected XSS
๐ด BE MY FRIEND
๐๐๐ฃ๐จ๐ฉ๐๐๐ง๐๐ข (thecybertix): https://www.instagram.com/thecybertix
๐๐๐ฌ๐๐ฉ๐ฉ๐๐ง: https://twitter.com/thecybertix
๐๐๐๐ฃ๐ ๐๐๐๐ฃ: https://www.linkedin.com/company/cybe...
๐๐๐๐๐จ๐๐ฉ๐: https://cybertix.in
๐ด RESOURCES
๐๐๐๐๐ก๐๐๐ฉ๐๐ ๐๐๐ ๐๐๐ฎ๐ก๐ค๐๐๐จ: https:โฆ
๐๐๐ฃ๐จ๐ฉ๐๐๐ง๐๐ข (thecybertix): https://www.instagram.com/thecybertix
๐๐๐ฌ๐๐ฉ๐ฉ๐๐ง: https://twitter.com/thecybertix
๐๐๐๐ฃ๐ ๐๐๐๐ฃ: https://www.linkedin.com/company/cybe...
๐๐๐๐๐จ๐๐ฉ๐: https://cybertix.in
๐ด RESOURCES
๐๐๐๐๐ก๐๐๐ฉ๐๐ ๐๐๐ ๐๐๐ฎ๐ก๐ค๐๐๐จ: https:โฆ
๐1
Forwarded from BlackDragonSec ๐ฎ๐ณ
Pokries.rar
313.2 MB
Forwarded from Team BlackDragonSec ๐ฎ๐ณ (BlackDragonSec)
Media is too big
VIEW IN TELEGRAM
Beta remember your still from my bloodline, your my son๐๐๐ป
Beta baap baap hotha hea
Beta baap baap hotha hea
โคโ๐ฅ4
Forwarded from Kerala Cyber Xtractors
HBL (Habib Bank Limited) THE LARGEST BANK IN PAKISTAN IS DOWN FOR MORE THAN 1 HOUR (MAYBE MORE THAN ONE HOUR)
https://check-host.net/check-report/fbe5c26k2bb
https://check-host.net/check-report/fbe5d5dk58b
https://check-host.net/check-report/fbe6714ka9f
https://check-host.net/check-report/fbe6978k604
https://check-host.net/check-report/fbe6a0akdd8
https://check-host.net/check-report/fbe6da0kfb
https://check-host.net/check-report/fbe6ec6k1a7
https://check-host.net/check-report/fbe704bk643
https://check-host.net/check-report/fbe7368kae7
https://check-host.net/check-report/fbe7368kae7
https://check-host.net/check-report/fbe84abkb28
#KCX
#KERALA_CYBER_XTRACTORS
FEEL THE POWER OF INDIAN HACKERS
Greetz to :-
#TEAM_ANON_101
#IndianCyberForce
#DarknetAssociation
#KeralaCyberXtractors
#NewWorldHacktivist
#IndianCyberMafia
#BlackDragonSecurity
#IndianCyberTroops
#AnonymousIndia
#IndianCyberPwnage
#UnknownCyberCult
#ERR0RxCYBER_FORCE
#1-4-1
#UnitedIndianHackers
#UnitedByOneDividedByZero
https://check-host.net/check-report/fbe5c26k2bb
https://check-host.net/check-report/fbe5d5dk58b
https://check-host.net/check-report/fbe6714ka9f
https://check-host.net/check-report/fbe6978k604
https://check-host.net/check-report/fbe6a0akdd8
https://check-host.net/check-report/fbe6da0kfb
https://check-host.net/check-report/fbe6ec6k1a7
https://check-host.net/check-report/fbe704bk643
https://check-host.net/check-report/fbe7368kae7
https://check-host.net/check-report/fbe7368kae7
https://check-host.net/check-report/fbe84abkb28
#KCX
#KERALA_CYBER_XTRACTORS
FEEL THE POWER OF INDIAN HACKERS
Greetz to :-
#TEAM_ANON_101
#IndianCyberForce
#DarknetAssociation
#KeralaCyberXtractors
#NewWorldHacktivist
#IndianCyberMafia
#BlackDragonSecurity
#IndianCyberTroops
#AnonymousIndia
#IndianCyberPwnage
#UnknownCyberCult
#ERR0RxCYBER_FORCE
#1-4-1
#UnitedIndianHackers
#UnitedByOneDividedByZero
Forwarded from CYBER DEMONS (INDIA๐ฎ๐ณ) ๐คCHANNEL๐ค (แดดแดฌแถแดทแดธแดผแถแดท)
A Beginnerโs Guide to Ethical Hacking and Bug Hunting
READ FULL BLOG ๐๐
https://cyberdemonsindia.42web.io/2023/04/28/a-beginners-guide-to-ethical-hacking-and-bug-hunting/
แดแดษชษด แดสแด สแดแดษขแดแด แด๊ฐ แดสสแดส แด แด๊ฐแดษดแด แดส๊ฑ แดษดแด สแดแดแดแดแด แดษด แดแดสษชแดแดส สแดแดแดแดส แดษดแด สแดษข สแดษดแดแดส แดกษชแดส แดแดส แดแดแดแดสแดสแดษด๊ฑษชแด แด สแดษขษชษดษดแดสโ๊ฑ ษขแดษชแด แด. แดษดสแดแดแด แดสแด ๊ฑแดแดสแดแด๊ฑ แด๊ฐ แดแดสษชแดแดส สแดแดแดษชษดษข แดษดแด สแดษข สแดษดแดษชษดษข แดษดแด แดแดแดแด สแดแดส แดแดสแด ษชษด แดสแด แดแด แดส-แดแด แดสแด ษชษดษข แดกแดสสแด แด๊ฐ แดสสแดส๊ฑแดแดแดสษชแดส. สแดแดโ๊ฑ แด ษชแด แด ษชษด แดษดแด ๊ฑแดแดสแด สแดแดส แดแดแดสษดแดส แดแดแด แดส!
READ FULL BLOG ๐๐
https://cyberdemonsindia.42web.io/2023/04/28/a-beginners-guide-to-ethical-hacking-and-bug-hunting/
แดแดษชษด แดสแด สแดแดษขแดแด แด๊ฐ แดสสแดส แด แด๊ฐแดษดแด แดส๊ฑ แดษดแด สแดแดแดแดแด แดษด แดแดสษชแดแดส สแดแดแดแดส แดษดแด สแดษข สแดษดแดแดส แดกษชแดส แดแดส แดแดแดแดสแดสแดษด๊ฑษชแด แด สแดษขษชษดษดแดสโ๊ฑ ษขแดษชแด แด. แดษดสแดแดแด แดสแด ๊ฑแดแดสแดแด๊ฑ แด๊ฐ แดแดสษชแดแดส สแดแดแดษชษดษข แดษดแด สแดษข สแดษดแดษชษดษข แดษดแด แดแดแดแด สแดแดส แดแดสแด ษชษด แดสแด แดแด แดส-แดแด แดสแด ษชษดษข แดกแดสสแด แด๊ฐ แดสสแดส๊ฑแดแดแดสษชแดส. สแดแดโ๊ฑ แด ษชแด แด ษชษด แดษดแด ๊ฑแดแดสแด สแดแดส แดแดแดสษดแดส แดแดแด แดส!
Forwarded from Tสษชแดแดส Pแดษดษขแดษชษด ( trickypenguin.ink )
Google Dorking for Penetration Testers
What is Google Dorking?
Dorking, also known as Google Dorking, is a technique used by hackers and penetration testers to search for sensitive information...
Read More
bit.ly/3oYWPxT
@trickypenguin
What is Google Dorking?
Dorking, also known as Google Dorking, is a technique used by hackers and penetration testers to search for sensitive information...
Read More
bit.ly/3oYWPxT
@trickypenguin
๐3
WebSocket Pentration Testing
HTML5 has introduced many new powerful APIs, one of the more interesting components being websockets. These highlight a trend in web application development to remove or reduce the overhead of HTTP.Read : https://system32.ink/websocket-pentration-testing/
๐3
Forwarded from BlackDragonSec ๐ฎ๐ณ
INDONESIANA MADRASAH APPLICATION SERVER HACKED
Play Store Link :
https://play.google.com/store/apps/details?id=id.hdmadrasah.rdm
App Store Link :
https://apps.apple.com/us/app/rdm-rapor-digital-madrasah/id1604487156
Database will be leaked Soon
#BlackDragonSec
#OpsPayBack
Greetz To All Indian Hackers
Play Store Link :
https://play.google.com/store/apps/details?id=id.hdmadrasah.rdm
App Store Link :
https://apps.apple.com/us/app/rdm-rapor-digital-madrasah/id1604487156
Database will be leaked Soon
#BlackDragonSec
#OpsPayBack
Greetz To All Indian Hackers
โค3
How To Recover Deleted Data From Pendrive And HardDisk
@crackcodes
When a file is deleted, the meta-information about this file (file name, date/time, size, location of the first data block/cluster, etc.) is lost; for example, in an ext3/ext4 file system, the names of deleted files are still present, but the location of the first data block is removed. This means the data is still present on the file system, but only until some or all of it is overwritten by new file data.
Read Article: https://bit.ly/Recover_data@crackcodes
๐ 5 ANIME BASED ON HACKING ๐
There are several anime series and movies that feature hacking as a central theme. Here we have listed 5 best animes for you.
With these anime, you will not only enjoy but also increase your knowledge of hacking & programming.
โ Link : bit.ly/AnimeOnHacking
Share & Support โค๏ธ
There are several anime series and movies that feature hacking as a central theme. Here we have listed 5 best animes for you.
With these anime, you will not only enjoy but also increase your knowledge of hacking & programming.
โ Link : bit.ly/AnimeOnHacking
Share & Support โค๏ธ
๐ผ๐ช๐ฉ๐๐๐ฃ๐ฉ๐๐๐๐ฉ๐๐ค๐ฃ ๐ซ๐จ ๐ผ๐ช๐ฉ๐๐ค๐ง๐๐ฏ๐๐ฉ๐๐ค๐ฃ
๐๐๐ฃ๐ : https://youtube.com/shorts/RFFDrICrAXc?feature=๐จ๐๐๐ง๐
๐๐ช๐๐จ๐๐ง๐๐๐ ๐ฉ๐ค ๐ค๐ช๐ง ๐๐ค๐ช๐๐ช๐๐ ๐๐๐๐ฃ๐ฃ๐๐ก ๐๐ค๐ง ๐ข๐ค๐ง๐ ๐ช๐ฅ๐๐ค๐ข๐๐ฃ๐ ๐พ๐ฎ๐๐๐ง ๐๐๐๐ช๐ง๐๐ฉ๐ฎ ๐๐๐๐๐ค๐จ ๐
๐๐๐ฃ๐ : https://youtube.com/shorts/RFFDrICrAXc?feature=๐จ๐๐๐ง๐
๐๐ช๐๐จ๐๐ง๐๐๐ ๐ฉ๐ค ๐ค๐ช๐ง ๐๐ค๐ช๐๐ช๐๐ ๐๐๐๐ฃ๐ฃ๐๐ก ๐๐ค๐ง ๐ข๐ค๐ง๐ ๐ช๐ฅ๐๐ค๐ข๐๐ฃ๐ ๐พ๐ฎ๐๐๐ง ๐๐๐๐ช๐ง๐๐ฉ๐ฎ ๐๐๐๐๐ค๐จ ๐
YouTube
Authentication VS Authorization
Authentication is the process of verifying the identity of a user, device, or system, while authorization is the process of granting or denying access to spe...
New Blog is Out Check Here ๐
https://www.cybersecuritymumbai.com/protect-your-mobile-from-hackers/
https://www.cybersecuritymumbai.com/protect-your-mobile-from-hackers/