Forwarded from Team BlackDragonSec 🇮🇳 (BlackDragonSec)
Media is too big
VIEW IN TELEGRAM
Beta remember your still from my bloodline, your my son🙃👋🏻
Beta baap baap hotha hea
Beta baap baap hotha hea
❤🔥4
Forwarded from Kerala Cyber Xtractors
HBL (Habib Bank Limited) THE LARGEST BANK IN PAKISTAN IS DOWN FOR MORE THAN 1 HOUR (MAYBE MORE THAN ONE HOUR)
https://check-host.net/check-report/fbe5c26k2bb
https://check-host.net/check-report/fbe5d5dk58b
https://check-host.net/check-report/fbe6714ka9f
https://check-host.net/check-report/fbe6978k604
https://check-host.net/check-report/fbe6a0akdd8
https://check-host.net/check-report/fbe6da0kfb
https://check-host.net/check-report/fbe6ec6k1a7
https://check-host.net/check-report/fbe704bk643
https://check-host.net/check-report/fbe7368kae7
https://check-host.net/check-report/fbe7368kae7
https://check-host.net/check-report/fbe84abkb28
#KCX
#KERALA_CYBER_XTRACTORS
FEEL THE POWER OF INDIAN HACKERS
Greetz to :-
#TEAM_ANON_101
#IndianCyberForce
#DarknetAssociation
#KeralaCyberXtractors
#NewWorldHacktivist
#IndianCyberMafia
#BlackDragonSecurity
#IndianCyberTroops
#AnonymousIndia
#IndianCyberPwnage
#UnknownCyberCult
#ERR0RxCYBER_FORCE
#1-4-1
#UnitedIndianHackers
#UnitedByOneDividedByZero
https://check-host.net/check-report/fbe5c26k2bb
https://check-host.net/check-report/fbe5d5dk58b
https://check-host.net/check-report/fbe6714ka9f
https://check-host.net/check-report/fbe6978k604
https://check-host.net/check-report/fbe6a0akdd8
https://check-host.net/check-report/fbe6da0kfb
https://check-host.net/check-report/fbe6ec6k1a7
https://check-host.net/check-report/fbe704bk643
https://check-host.net/check-report/fbe7368kae7
https://check-host.net/check-report/fbe7368kae7
https://check-host.net/check-report/fbe84abkb28
#KCX
#KERALA_CYBER_XTRACTORS
FEEL THE POWER OF INDIAN HACKERS
Greetz to :-
#TEAM_ANON_101
#IndianCyberForce
#DarknetAssociation
#KeralaCyberXtractors
#NewWorldHacktivist
#IndianCyberMafia
#BlackDragonSecurity
#IndianCyberTroops
#AnonymousIndia
#IndianCyberPwnage
#UnknownCyberCult
#ERR0RxCYBER_FORCE
#1-4-1
#UnitedIndianHackers
#UnitedByOneDividedByZero
Forwarded from CYBER DEMONS (INDIA🇮🇳) 🤖CHANNEL🤖 (ᴴᴬᶜᴷᴸᴼᶜᴷ)
A Beginner’s Guide to Ethical Hacking and Bug Hunting
READ FULL BLOG 👇👇
https://cyberdemonsindia.42web.io/2023/04/28/a-beginners-guide-to-ethical-hacking-and-bug-hunting/
ᴊᴏɪɴ ᴛʜᴇ ʟᴇᴀɢᴜᴇ ᴏꜰ ᴄʏʙᴇʀ ᴅᴇꜰᴇɴᴅᴇʀꜱ ᴀɴᴅ ʙᴇᴄᴏᴍᴇ ᴀɴ ᴇᴛʜɪᴄᴀʟ ʜᴀᴄᴋᴇʀ ᴀɴᴅ ʙᴜɢ ʜᴜɴᴛᴇʀ ᴡɪᴛʜ ᴏᴜʀ ᴄᴏᴍᴘʀᴇʜᴇɴꜱɪᴠᴇ ʙᴇɢɪɴɴᴇʀ’ꜱ ɢᴜɪᴅᴇ. ᴜɴʟᴏᴄᴋ ᴛʜᴇ ꜱᴇᴄʀᴇᴛꜱ ᴏꜰ ᴇᴛʜɪᴄᴀʟ ʜᴀᴄᴋɪɴɢ ᴀɴᴅ ʙᴜɢ ʜᴜɴᴛɪɴɢ ᴀɴᴅ ᴍᴀᴋᴇ ʏᴏᴜʀ ᴍᴀʀᴋ ɪɴ ᴛʜᴇ ᴇᴠᴇʀ-ᴇᴠᴏʟᴠɪɴɢ ᴡᴏʀʟᴅ ᴏꜰ ᴄʏʙᴇʀꜱᴇᴄᴜʀɪᴛʏ. ʟᴇᴛ’ꜱ ᴅɪᴠᴇ ɪɴ ᴀɴᴅ ꜱᴛᴀʀᴛ ʏᴏᴜʀ ᴊᴏᴜʀɴᴇʏ ᴛᴏᴅᴀʏ!
READ FULL BLOG 👇👇
https://cyberdemonsindia.42web.io/2023/04/28/a-beginners-guide-to-ethical-hacking-and-bug-hunting/
ᴊᴏɪɴ ᴛʜᴇ ʟᴇᴀɢᴜᴇ ᴏꜰ ᴄʏʙᴇʀ ᴅᴇꜰᴇɴᴅᴇʀꜱ ᴀɴᴅ ʙᴇᴄᴏᴍᴇ ᴀɴ ᴇᴛʜɪᴄᴀʟ ʜᴀᴄᴋᴇʀ ᴀɴᴅ ʙᴜɢ ʜᴜɴᴛᴇʀ ᴡɪᴛʜ ᴏᴜʀ ᴄᴏᴍᴘʀᴇʜᴇɴꜱɪᴠᴇ ʙᴇɢɪɴɴᴇʀ’ꜱ ɢᴜɪᴅᴇ. ᴜɴʟᴏᴄᴋ ᴛʜᴇ ꜱᴇᴄʀᴇᴛꜱ ᴏꜰ ᴇᴛʜɪᴄᴀʟ ʜᴀᴄᴋɪɴɢ ᴀɴᴅ ʙᴜɢ ʜᴜɴᴛɪɴɢ ᴀɴᴅ ᴍᴀᴋᴇ ʏᴏᴜʀ ᴍᴀʀᴋ ɪɴ ᴛʜᴇ ᴇᴠᴇʀ-ᴇᴠᴏʟᴠɪɴɢ ᴡᴏʀʟᴅ ᴏꜰ ᴄʏʙᴇʀꜱᴇᴄᴜʀɪᴛʏ. ʟᴇᴛ’ꜱ ᴅɪᴠᴇ ɪɴ ᴀɴᴅ ꜱᴛᴀʀᴛ ʏᴏᴜʀ ᴊᴏᴜʀɴᴇʏ ᴛᴏᴅᴀʏ!
Forwarded from Tʀɪᴄᴋʏ Pᴇɴɢᴜɪɴ ( trickypenguin.ink )
Google Dorking for Penetration Testers
What is Google Dorking?
Dorking, also known as Google Dorking, is a technique used by hackers and penetration testers to search for sensitive information...
Read More
bit.ly/3oYWPxT
@trickypenguin
What is Google Dorking?
Dorking, also known as Google Dorking, is a technique used by hackers and penetration testers to search for sensitive information...
Read More
bit.ly/3oYWPxT
@trickypenguin
👍3
WebSocket Pentration Testing
HTML5 has introduced many new powerful APIs, one of the more interesting components being websockets. These highlight a trend in web application development to remove or reduce the overhead of HTTP.Read : https://system32.ink/websocket-pentration-testing/
👍3
Forwarded from BlackDragonSec 🇮🇳
INDONESIANA MADRASAH APPLICATION SERVER HACKED
Play Store Link :
https://play.google.com/store/apps/details?id=id.hdmadrasah.rdm
App Store Link :
https://apps.apple.com/us/app/rdm-rapor-digital-madrasah/id1604487156
Database will be leaked Soon
#BlackDragonSec
#OpsPayBack
Greetz To All Indian Hackers
Play Store Link :
https://play.google.com/store/apps/details?id=id.hdmadrasah.rdm
App Store Link :
https://apps.apple.com/us/app/rdm-rapor-digital-madrasah/id1604487156
Database will be leaked Soon
#BlackDragonSec
#OpsPayBack
Greetz To All Indian Hackers
❤3
How To Recover Deleted Data From Pendrive And HardDisk
@crackcodes
When a file is deleted, the meta-information about this file (file name, date/time, size, location of the first data block/cluster, etc.) is lost; for example, in an ext3/ext4 file system, the names of deleted files are still present, but the location of the first data block is removed. This means the data is still present on the file system, but only until some or all of it is overwritten by new file data.
Read Article: https://bit.ly/Recover_data@crackcodes
😍 5 ANIME BASED ON HACKING 😍
There are several anime series and movies that feature hacking as a central theme. Here we have listed 5 best animes for you.
With these anime, you will not only enjoy but also increase your knowledge of hacking & programming.
✅ Link : bit.ly/AnimeOnHacking
Share & Support ❤️
There are several anime series and movies that feature hacking as a central theme. Here we have listed 5 best animes for you.
With these anime, you will not only enjoy but also increase your knowledge of hacking & programming.
✅ Link : bit.ly/AnimeOnHacking
Share & Support ❤️
𝘼𝙪𝙩𝙝𝙚𝙣𝙩𝙞𝙘𝙖𝙩𝙞𝙤𝙣 𝙫𝙨 𝘼𝙪𝙩𝙝𝙤𝙧𝙞𝙯𝙖𝙩𝙞𝙤𝙣
𝙇𝙞𝙣𝙠: https://youtube.com/shorts/RFFDrICrAXc?feature=𝙨𝙝𝙖𝙧𝙚
𝙎𝙪𝙗𝙨𝙘𝙧𝙞𝙗𝙚 𝙩𝙤 𝙤𝙪𝙧 𝙔𝙤𝙪𝙏𝙪𝙗𝙚 𝙘𝙝𝙖𝙣𝙣𝙚𝙡 𝙛𝙤𝙧 𝙢𝙤𝙧𝙚 𝙪𝙥𝙘𝙤𝙢𝙞𝙣𝙜 𝘾𝙮𝙗𝙚𝙧 𝙎𝙚𝙘𝙪𝙧𝙞𝙩𝙮 𝙑𝙞𝙙𝙚𝙤𝙨 🙏
𝙇𝙞𝙣𝙠: https://youtube.com/shorts/RFFDrICrAXc?feature=𝙨𝙝𝙖𝙧𝙚
𝙎𝙪𝙗𝙨𝙘𝙧𝙞𝙗𝙚 𝙩𝙤 𝙤𝙪𝙧 𝙔𝙤𝙪𝙏𝙪𝙗𝙚 𝙘𝙝𝙖𝙣𝙣𝙚𝙡 𝙛𝙤𝙧 𝙢𝙤𝙧𝙚 𝙪𝙥𝙘𝙤𝙢𝙞𝙣𝙜 𝘾𝙮𝙗𝙚𝙧 𝙎𝙚𝙘𝙪𝙧𝙞𝙩𝙮 𝙑𝙞𝙙𝙚𝙤𝙨 🙏
YouTube
Authentication VS Authorization
Authentication is the process of verifying the identity of a user, device, or system, while authorization is the process of granting or denying access to spe...
Signal-zeroday-exploit
Signal RCE vulnerability found in contact exchange API
Usage:
Signal RCE vulnerability found in contact exchange API
Usage:
python poc.py -t [TARGET PHONE #] -i [IP HERE] -p [PORT HERE]Download: https://system32.ink/news-feed/p/333/
Telegram-0day-exploit-poc
Zero Day revshell exploit tool for Remote Code Execution vulnerability found in Telegram's bot api broadcast_msg api call.
Usage:
Zero Day revshell exploit tool for Remote Code Execution vulnerability found in Telegram's bot api broadcast_msg api call.
Usage:
python poc.py -u [TELEGRAM USER] -i [IP HERE] -p [PORT HERE]
Download: https://system32.ink/news-feed/p/334/Install and Use Intrusion detection system Snort
https://techofide.com/blogs/snort-intrusion-detection-system-prevention-system-installation-use-in-linux/
Join our group for more cyber security content
t.me/ethicalhackingtechofide
https://techofide.com/blogs/snort-intrusion-detection-system-prevention-system-installation-use-in-linux/
Join our group for more cyber security content
t.me/ethicalhackingtechofide
DNSRecon
Dnsrecon is one of the popular scripts in the security community which is used for reconnaissance on domains. This script is written in python language.
This script checks all the DNS records for AXFR which can be useful for a security researcher for DNS enumeration on all types of records such as SOA, NS, TXT, SVR, SPF, etc.
Dnsrecon is one of the popular scripts in the security community which is used for reconnaissance on domains. This script is written in python language.
This script checks all the DNS records for AXFR which can be useful for a security researcher for DNS enumeration on all types of records such as SOA, NS, TXT, SVR, SPF, etc.