Forwarded from CYBER DEMONS (INDIA๐ฎ๐ณ) ๐คCHANNEL๐ค (แดดแดฌแถแดทแดธแดผแถแดท)
PHISHING - DON'T BE A VICTIM
Learn how to protect yourself from phishing attacks with our comprehensive guide โ Phishing : Donโt Be A Victim โ . Discover the different types of phishing and how to identify them, as well as the preventative measures you can take to safeguard yourself from cybercrime. Donโt let scammers trick you into handing over sensitive information โ read our guide now and stay safe online! ๐ฅ๐พ
READ FULL BLOG ๐๐
http://cyberdemonsindia.42web.io/cyber-security/phishing-dont-be-a-victim/
Learn how to protect yourself from phishing attacks with our comprehensive guide โ Phishing : Donโt Be A Victim โ . Discover the different types of phishing and how to identify them, as well as the preventative measures you can take to safeguard yourself from cybercrime. Donโt let scammers trick you into handing over sensitive information โ read our guide now and stay safe online! ๐ฅ๐พ
READ FULL BLOG ๐๐
http://cyberdemonsindia.42web.io/cyber-security/phishing-dont-be-a-victim/
CVE-2023-0386 | Linux Kernel Privilege Escalation
Download: https://system32.ink/news-feed/p/340/
Enables an attacker with low-privileged user access on a Linux machine with an overlay mount containing a file capability in one of its layers to escalate their privileges up to root. The attacker can achieve this by copying a capable file from a nosuid mount into another mount.
CVE-2023-0698 TALOS-2023-1693, Google Chrome WebRTC RTCStatsCollector OOB memory access vuln
๐ฅAn OOB memory access vulnerability exists in stats reporting functionality of the WebRTC implementation in Google Chrome 109.0.5414.74 and 108.0.5359.124. A specially crafted malicious web page can trigger an OOB access which can lead to type confusion and further memory corruption. A victim would need to navigate to a malicious webpage to trigger this vulnerability.
Download Exploit Poc: https://system32.ink/news-feed/p/341/
Download Exploit Poc:
Forwarded from ๐๐ง๐ค๐ฉ๐ค๐๐ค๐ก ๐๐๐๐
aacle on Notion
Malicious File Upload Checklist | Notion
โก2
XSS Rocket is written by Black Hat Ethical Hacking with the help of
Forwarded from CYBER TRICKS ZONE ๐ฎ๐ณ๐ฉ (๐๐ง๐ค๐ฉ๐ค๐๐ค๐ก ๐๐๐๐ )
Explore the FREE SQL resources that jump-started my career and can boost yours too!
A lot of people have asked me about the best places to learn SQL, so I've put together a list of free tools that helped me a lot.
I really like having a step-by-step plan for learning, and these resources make it easy and fun to keep going.
๐๐ผ๐ฟ ๐ณ๐ฟ๐ฒ๐ฒ ๐ฟ๐ฒ๐๐ผ๐๐ฟ๐ฐ๐ฒ๐:
๐ธ freecodecamp.org: https://lnkd.in/duCfNtTW
๐ธ Programming with Mosh: https://lnkd.in/dFT8UQ4x
๐ธ techTFQ: https://lnkd.in/d_aSwXpJ
๐ธ Alex the Analyst: https://lnkd.in/dCXcY82Z
๐๐ฑ๐ฑ๐ถ๐๐ถ๐ผ๐ป๐ฎ๐น ๐ณ๐ฟ๐ฒ๐ฒ ๐ฟ๐ฒ๐๐ผ๐๐ฟ๐ฐ๐ฒ๐:
๐ธ SQLBolt: http://sqlbolt.com
๐ธ SQLZoo: https://lnkd.in/dCa9Vwgv
๐ธ SQLTest: http://sqltest.net
๐ธ W3Schools.com: http://w3schools.com/sql/
๐ธ Codecademy: https://lnkd.in/d2J3956R
๐ง๐ผ ๐ฝ๐ฟ๐ฎ๐ฐ๐๐ถ๐ฐ๐ฒ:
๐ธ LeetCode: https://leetcode.com
๐ธ HackerRank: https://www.hackerrank.com
๐ธ DataLemur: https://datalemur.com
๐๐ผ๐ฟ ๐ณ๐๐ป ๐ด๐ฎ๐บ๐ฒ๐ ๐ผ๐ป ๐ฆ๐ค๐:
๐ธ SQLZOO: https://sqlzoo.net/
๐ธ SQLBOLT: https://sqlbolt.com/
๐ธ SQL Murder Mystery: https://lnkd.in/dbw9JUY5
I hope these resources help you learn and master SQL in a fun and engaging way. Good luck on your journey!
๐ Enjoying my content? Stay in the loop! ๐
---------
A lot of people have asked me about the best places to learn SQL, so I've put together a list of free tools that helped me a lot.
I really like having a step-by-step plan for learning, and these resources make it easy and fun to keep going.
๐๐ผ๐ฟ ๐ณ๐ฟ๐ฒ๐ฒ ๐ฟ๐ฒ๐๐ผ๐๐ฟ๐ฐ๐ฒ๐:
๐ธ freecodecamp.org: https://lnkd.in/duCfNtTW
๐ธ Programming with Mosh: https://lnkd.in/dFT8UQ4x
๐ธ techTFQ: https://lnkd.in/d_aSwXpJ
๐ธ Alex the Analyst: https://lnkd.in/dCXcY82Z
๐๐ฑ๐ฑ๐ถ๐๐ถ๐ผ๐ป๐ฎ๐น ๐ณ๐ฟ๐ฒ๐ฒ ๐ฟ๐ฒ๐๐ผ๐๐ฟ๐ฐ๐ฒ๐:
๐ธ SQLBolt: http://sqlbolt.com
๐ธ SQLZoo: https://lnkd.in/dCa9Vwgv
๐ธ SQLTest: http://sqltest.net
๐ธ W3Schools.com: http://w3schools.com/sql/
๐ธ Codecademy: https://lnkd.in/d2J3956R
๐ง๐ผ ๐ฝ๐ฟ๐ฎ๐ฐ๐๐ถ๐ฐ๐ฒ:
๐ธ LeetCode: https://leetcode.com
๐ธ HackerRank: https://www.hackerrank.com
๐ธ DataLemur: https://datalemur.com
๐๐ผ๐ฟ ๐ณ๐๐ป ๐ด๐ฎ๐บ๐ฒ๐ ๐ผ๐ป ๐ฆ๐ค๐:
๐ธ SQLZOO: https://sqlzoo.net/
๐ธ SQLBOLT: https://sqlbolt.com/
๐ธ SQL Murder Mystery: https://lnkd.in/dbw9JUY5
I hope these resources help you learn and master SQL in a fun and engaging way. Good luck on your journey!
๐ Enjoying my content? Stay in the loop! ๐
---------
lnkd.in
LinkedIn
This link will take you to a page thatโs not on LinkedIn
๐1
Wanted Terr0rist & Khalistan Commando Force head Paramjit Singh Panjwar aka Malik Sardar Singh neutralised by two unidentified gunmen in Johar Town, Lahore in #Pakistan
It's same town in which 26/11 Mumbai attack most wanted Hafiz saeed house is their.
It's same town in which 26/11 Mumbai attack most wanted Hafiz saeed house is their.
๐6๐2
Exploit Title : phpMyAdmin 5.1.1 - XSS (Cross-site Scripting)
Affected Versions : phpMyAdmin versions of the 5.1 branch prior to 5.1.2 are affected.
OWASP OWTF is a project focused on penetration testing efficiency and alignment of security tests to security standards like the OWASP Testing Guide (v3 and v4), the OWASP Top 10, PTES and NIST...
Forwarded from ByteUpdates โก
The Indian Space Research Organisation (ISRO) is set to launch two missions in July 2023 - Chandrayaan 3 and Aditya L1.
Chandrayaan 3 will be the third moon mission and will have a lander and a rover, while Aditya L1 will be India's first-ever space mission to the sun.
The Aditya L1 mission aims to study the solar atmosphere and its impact on Earth.
The total budget for Aditya L1 is around Rs 378 crore, while the budget for Chandrayaan 3 is around Rs 615 crore.
Chandrayaan 3 will be the third moon mission and will have a lander and a rover, while Aditya L1 will be India's first-ever space mission to the sun.
The Aditya L1 mission aims to study the solar atmosphere and its impact on Earth.
The total budget for Aditya L1 is around Rs 378 crore, while the budget for Chandrayaan 3 is around Rs 615 crore.
๐ฅ11โค1โคโ๐ฅ1๐1
๐ฏ Web Pentesting RoadMap ๐ฏ
Web pentesting is the practice of identifying security vulnerabilities in web applications and websites, in order to improve their security.
It involves finding weaknesses that could be exploited by malicious actors, and recommending measures to mitigate these risks. In this blog, we will discuss a roadmap for becoming a successful web pentester.
Link: bit.ly/WebPentestingRoadmap
Share & Support โค๏ธ
Web pentesting is the practice of identifying security vulnerabilities in web applications and websites, in order to improve their security.
It involves finding weaknesses that could be exploited by malicious actors, and recommending measures to mitigate these risks. In this blog, we will discuss a roadmap for becoming a successful web pentester.
Link: bit.ly/WebPentestingRoadmap
Share & Support โค๏ธ
๐4
This media is not supported in your browser
VIEW IN TELEGRAM
Congress's Telangana manifesto that every Karnataka voter must listen to.
โช๏ธAll government contracts to Muslim youths.
โช๏ธ20 lakh financial aid to poor Muslim students.
โช๏ธResidential schools for Muslims only.
โช๏ธHospitals for minorities only.
โช๏ธFree electricity supply to Masjid and Churches.
โช๏ธAll government contracts to Muslim youths.
โช๏ธ20 lakh financial aid to poor Muslim students.
โช๏ธResidential schools for Muslims only.
โช๏ธHospitals for minorities only.
โช๏ธFree electricity supply to Masjid and Churches.
๐ฝ๐ช๐ ๐๐ฎ๐ฅ๐: Stored XSS
Course Link: https://youtu.be/uUmMc05iFuo
Please Share your views
&
๐๐ช๐๐จ๐๐ง๐๐๐ ๐ฉ๐ค ๐ค๐ช๐ง ๐๐ค๐ช๐๐ช๐๐ ๐๐๐๐ฃ๐ฃ๐๐ก๐๐ป
๐๐๐๐ฃ๐ ๐จ ๐๐ค๐ง ๐ฎ๐ค๐ช๐ง ๐๐ช๐ฅ๐ฅ๐ค๐ง๐ฉ. โบ๏ธ
Course Link: https://youtu.be/uUmMc05iFuo
Please Share your views
&
๐๐ช๐๐จ๐๐ง๐๐๐ ๐ฉ๐ค ๐ค๐ช๐ง ๐๐ค๐ช๐๐ช๐๐ ๐๐๐๐ฃ๐ฃ๐๐ก๐๐ป
๐๐๐๐ฃ๐ ๐จ ๐๐ค๐ง ๐ฎ๐ค๐ช๐ง ๐๐ช๐ฅ๐ฅ๐ค๐ง๐ฉ. โบ๏ธ
YouTube
06 Stored XSS
๐ด BE MY FRIEND
๐๐๐ฃ๐จ๐ฉ๐๐๐ง๐๐ข (thecybertix): https://www.instagram.com/thecybertix
๐๐๐ฌ๐๐ฉ๐ฉ๐๐ง: https://twitter.com/thecybertix
๐๐๐๐ฃ๐ ๐๐๐๐ฃ: https://www.linkedin.com/company/cybertix/
๐๐๐๐๐จ๐๐ฉ๐: https://cybertix.in
๐ด RESOURCES
๐๐๐๐ ๐๐๐ฎ๐ก๐ค๐๐๐จ: https://drive.โฆ
๐๐๐ฃ๐จ๐ฉ๐๐๐ง๐๐ข (thecybertix): https://www.instagram.com/thecybertix
๐๐๐ฌ๐๐ฉ๐ฉ๐๐ง: https://twitter.com/thecybertix
๐๐๐๐ฃ๐ ๐๐๐๐ฃ: https://www.linkedin.com/company/cybertix/
๐๐๐๐๐จ๐๐ฉ๐: https://cybertix.in
๐ด RESOURCES
๐๐๐๐ ๐๐๐ฎ๐ก๐ค๐๐๐จ: https://drive.โฆ
๐Top Java Courses for Free with Certificates
๐ฏLink : https://pentestingguide.com/java-courses-online-free-with-certificates/
๐ฏLink : https://pentestingguide.com/java-courses-online-free-with-certificates/
๐3
๐ฅCVE-2021-38001: A Brief Introduction to V8 Inline Cache and Exploitating Type Confusion + Blog
CVE-2021-38001 as a type confusion bug(issue happened in V8โs inline cache and can result in RCE) requires some basic knowledge on what an inline cache is, and how it works in v8.
Download: https://system32.ink/news-feed/p/347/
CVE-2021-38001 as a type confusion bug(issue happened in V8โs inline cache and can result in RCE) requires some basic knowledge on what an inline cache is, and how it works in v8.
Download: https://system32.ink/news-feed/p/347/
๐1
Forwarded from Tสษชแดแดส Pแดษดษขแดษชษด ( trickypenguin.ink )
SQL injection tools are used by security professionals and hackers alike to identify and exploit weaknesses in the web applicationโs backend database. These tools can help testers identify vulnerabilities that may have gone unnoticed during manual testing.
Read Full Article
https://trickypenguin.ink/open-source-sql-injection-tools/
Read Full Article
https://trickypenguin.ink/open-source-sql-injection-tools/
๐ฅ5