Forwarded from CYBER TRICKS ZONE ๐ฎ๐ณ๐ฉ (๐๐ง๐ค๐ฉ๐ค๐๐ค๐ก ๐๐๐๐ )
Here are some suggestions for practicing Python:
Write code: One of the best ways to practice Python is to write code. You can start by working through tutorials and exercises to get a feel for the language, and then try writing your own small programs.
Solve problems: There are many websites and resources that offer programming challenges and exercises. You can use these to practice your Python skills by solving problems and writing code to solve them.
Work on a project: Choose a project that interests you and use Python to build it. This could be a simple program or a more complex application. Working on a project will give you a chance to apply your skills and learn new concepts.
Join a community: There are many online communities and forums where you can ask questions and get help with your Python learning. You can also join local meetups or groups to connect with other Python learners and developers.
Use online resources: There are many online resources and tutorials available for learning Python. You can use these to learn new concepts and practice your skills.
Remember to be patient and persistent as you practice Python. It can take time to become proficient in any new skill, but with practice and dedication, you will improve.
Write code: One of the best ways to practice Python is to write code. You can start by working through tutorials and exercises to get a feel for the language, and then try writing your own small programs.
Solve problems: There are many websites and resources that offer programming challenges and exercises. You can use these to practice your Python skills by solving problems and writing code to solve them.
Work on a project: Choose a project that interests you and use Python to build it. This could be a simple program or a more complex application. Working on a project will give you a chance to apply your skills and learn new concepts.
Join a community: There are many online communities and forums where you can ask questions and get help with your Python learning. You can also join local meetups or groups to connect with other Python learners and developers.
Use online resources: There are many online resources and tutorials available for learning Python. You can use these to learn new concepts and practice your skills.
Remember to be patient and persistent as you practice Python. It can take time to become proficient in any new skill, but with practice and dedication, you will improve.
โค2
๐2
๐ฑDatabase Leaks: https://system32.ink/f/database/
Leak //softjoias.com.br : https://system32.ink/d/leak-softjoias-com-br/
Leak //baianomateriais.com.br: https://system32.ink/d/leak-baianomateriais-com-br-2/
Leak //papelariaamaral.com.br: https://system32.ink/d/leak-papelariaamaral-com-br/
Leak //pensoupneus.com.br: https://system32.ink/d/leak-pensoupneus-com-br/
Leak //vlpcomercial.com.br: https://system32.ink/d/leak-vlpcomercial-com-br/
๐ฑCrack Softwares: https://system32.ink/f/crack-tools/
Acunetix v15.6 Crack: https://system32.ink/d/acunetix-v15-6-crack/
Leak //softjoias.com.br : https://system32.ink/d/leak-softjoias-com-br/
Leak //baianomateriais.com.br: https://system32.ink/d/leak-baianomateriais-com-br-2/
Leak //papelariaamaral.com.br: https://system32.ink/d/leak-papelariaamaral-com-br/
Leak //pensoupneus.com.br: https://system32.ink/d/leak-pensoupneus-com-br/
Leak //vlpcomercial.com.br: https://system32.ink/d/leak-vlpcomercial-com-br/
๐ฑCrack Softwares: https://system32.ink/f/crack-tools/
Acunetix v15.6 Crack: https://system32.ink/d/acunetix-v15-6-crack/
๐ฅCVE-2017-6195 (SQL-Injection in MOVEit Transfer aka MOVEit DMZ)
https://system32.ink/d/cve-2017-6195-exploit/
https://system32.ink/d/cve-2017-6195-exploit/
*โ ๏ธ Researchers claim Windows โbackdoorโ affects hundreds of Gigabyte motherboards โ ๏ธ*
_It's a backdoor, Jim, but not as we know it... here's a sober look at this issue._
Link:https://nakedsecurity.sophos.com/2023/06/02/researchers-claim-windows-backdoor-affects-hundreds-of-gigabyte-motherboards/
via _"Naked Security"_
#hacker_bano_chutiya_nhe ๐ซ
_It's a backdoor, Jim, but not as we know it... here's a sober look at this issue._
Link:https://nakedsecurity.sophos.com/2023/06/02/researchers-claim-windows-backdoor-affects-hundreds-of-gigabyte-motherboards/
via _"Naked Security"_
#hacker_bano_chutiya_nhe ๐ซ
Leak Databases:
๐๐ปLeak bamsi org : https://system32.ink/d/leak-bamsi-org/
๐๐ปAl Tamimi: https://system32.ink/d/leak-tamimi-com/
Tools:
๐๐ปKittyStager: https://system32.ink/members/mcracker2002/activity/392/
A simple stage 0 C2. It is made of a web server to host the shellcode and an implant, called kitten. The purpose of this project is to be able to have a web server and some kitten and be able to use the with any shellcode.
๐๐ปLeak bamsi org : https://system32.ink/d/leak-bamsi-org/
๐๐ปAl Tamimi: https://system32.ink/d/leak-tamimi-com/
Tools:
๐๐ปKittyStager: https://system32.ink/members/mcracker2002/activity/392/
A simple stage 0 C2. It is made of a web server to host the shellcode and an implant, called kitten. The purpose of this project is to be able to have a web server and some kitten and be able to use the with any shellcode.
๐ฅ2
Real time attempts to break into my servers by attackers trying to guess usernames and passwords. No legitimate services are offered on the addresses receiving these attempts, so there is no chance of a real user accidently submitting their credentials. (Yes things other than SSH occasionally show up)
brute.fail
brute.fail
๐จ๐ปโ๐ปBest ASUS Laptop for Programming๐จ๐ปโ๐ป
ASUS laptops for programming are known for their powerful performance, including fast processors and ample RAM. They also feature high-quality displays, which are crucial for coding and viewing code.
๐Link: https://pentestingguide.com/asus-laptop-for-programming/
ASUS laptops for programming are known for their powerful performance, including fast processors and ample RAM. They also feature high-quality displays, which are crucial for coding and viewing code.
๐Link: https://pentestingguide.com/asus-laptop-for-programming/
๐ฅTools:
๐๐ปLightsOut : Generate an obfuscated DLL that will disable AMSI & ETW
https://system32.ink/d/lightsout-generate-an-obfuscated-dll-that-will-disable-amsi-etw/
๐๐ปBinder Trace is a tool for intercepting and parsing(trace, filter and inspect) Android Binder messages. Think of it as "Wireshark for Binder".
Very useful when Android reversing and VR.
https://system32.ink/d/%f0%9f%92%a5binder-trace/
๐๐ปLightsOut : Generate an obfuscated DLL that will disable AMSI & ETW
https://system32.ink/d/lightsout-generate-an-obfuscated-dll-that-will-disable-amsi-etw/
๐๐ปBinder Trace is a tool for intercepting and parsing(trace, filter and inspect) Android Binder messages. Think of it as "Wireshark for Binder".
Very useful when Android reversing and VR.
https://system32.ink/d/%f0%9f%92%a5binder-trace/
Forwarded from CYBER TRICKS ZONE ๐ฎ๐ณ๐ฉ (๐๐ง๐ค๐ฉ๐ค๐๐ค๐ก ๐๐๐๐ )
Forwarded from WE ARE BLOODNET
==================
โ ๏ธ[SITE]: https://mopa(.)gov(.)pk
โพ๏ธ[PROOF]: https://check-host.net/check-report/10228d8bkb16
==================
โ ๏ธ[SITE]: https://pifra(.)gov(.)pk
โพ๏ธ[PROOF]: https://check-host.net/check-report/10227de5k96a
==================
โ ๏ธ[SITE]: https://pspc(.)gov(.)pk
โพ๏ธ[PROOF]: https://check-host.net/check-report/10227e1fk490
==================
โ ๏ธ[SITE]: https://nspp(.)gov(.)pk
โพ๏ธ[PROOF]: https://check-host.net/check-report/102287b0kee8
==================
โ ๏ธ[SITE]: http://csa(.)gov(.)pk
โพ๏ธ[PROOF]: https://check-host.net/check-report/10229174kc21
==================
โ ๏ธ[SITE]: http://ecopsc(.)gov(.)pk
โพ๏ธ[PROOF]: https://check-host.net/check-report/1022926bkfa8
==================
โ ๏ธ[SITE]: https://pbrr(.)gov(.)pk
โพ๏ธ[PROOF]: https://check-host.net/check-report/1022971ak781
==================
โ ๏ธ[SITE]: http://ncndt(.)org(.)pk
โพ๏ธ[PROOF]: https://check-host.net/check-report/1022a280ke5d
==================
โ ๏ธ[SITE]: https://onsa(.)gov(.)pk
โพ๏ธ[PROOF]: https://check-host.net/check-report/1022a481ke39
==================
#FuckNato
#BLOODNET
#Phoenix
#PhoenixALLIANCE
#DDoS_Attack
โ ๏ธ[SITE]: https://mopa(.)gov(.)pk
โพ๏ธ[PROOF]: https://check-host.net/check-report/10228d8bkb16
==================
โ ๏ธ[SITE]: https://pifra(.)gov(.)pk
โพ๏ธ[PROOF]: https://check-host.net/check-report/10227de5k96a
==================
โ ๏ธ[SITE]: https://pspc(.)gov(.)pk
โพ๏ธ[PROOF]: https://check-host.net/check-report/10227e1fk490
==================
โ ๏ธ[SITE]: https://nspp(.)gov(.)pk
โพ๏ธ[PROOF]: https://check-host.net/check-report/102287b0kee8
==================
โ ๏ธ[SITE]: http://csa(.)gov(.)pk
โพ๏ธ[PROOF]: https://check-host.net/check-report/10229174kc21
==================
โ ๏ธ[SITE]: http://ecopsc(.)gov(.)pk
โพ๏ธ[PROOF]: https://check-host.net/check-report/1022926bkfa8
==================
โ ๏ธ[SITE]: https://pbrr(.)gov(.)pk
โพ๏ธ[PROOF]: https://check-host.net/check-report/1022971ak781
==================
โ ๏ธ[SITE]: http://ncndt(.)org(.)pk
โพ๏ธ[PROOF]: https://check-host.net/check-report/1022a280ke5d
==================
โ ๏ธ[SITE]: https://onsa(.)gov(.)pk
โพ๏ธ[PROOF]: https://check-host.net/check-report/1022a481ke39
==================
#FuckNato
#BLOODNET
#Phoenix
#PhoenixALLIANCE
#DDoS_Attack
=========BLOODNET========check-host.net
Check report was removed
: Check host - online website monitoring
: Check host - online website monitoring
Check report was removed:
website monitoring with useful tools, Check IP, Check website
website monitoring with useful tools, Check IP, Check website
Forwarded from CYBER DEMONS (INDIA๐ฎ๐ณ) ๐คCHANNEL๐ค (HackLock)
SO HERE'S THE CHANNEL FOR YOU GUYS WHERE WE WILL GONNA POST ALL POSSIBLE JOBS AND INTERNSHIPS OFFERS IN INDIA FOR FRESHERS AND EXPERIENCED BOTH โ๏ธ๐ฎ๐ณ
๐๐๐๐๐๐๐๐๐๐๐๐๐
https://t.me/cyberdemonsindiaDDJ
TEAM @cyberdemonsindia ๐ฎ๐ณ
JAY SHREE RAAM ๐ฅฐ
๐๐๐๐๐๐๐๐๐๐๐๐๐
https://t.me/cyberdemonsindiaDDJ
TEAM @cyberdemonsindia ๐ฎ๐ณ
JAY SHREE RAAM ๐ฅฐ
Injecting scripts into web pages
Draining the theme of injections, chromium extension for working with bots
Functional:
Injecting scripts into web pages
Collection of cookies in .json format
Sending PUSH notifications
Create a hidden screenshot of the current browser screen
View all installed extensions and enable/disable them
Getting the actual URL where the bot is located
Download browser history in .json format
Using the botโs IP and its cookies (reverse proxy)
link https://xss.is/threads/80558/
Product price on the forum : 5.000$
Download: https://system32.ink/d/injecting-scripts-into-web-pages/
Draining the theme of injections, chromium extension for working with bots
Functional:
Injecting scripts into web pages
Collection of cookies in .json format
Sending PUSH notifications
Create a hidden screenshot of the current browser screen
View all installed extensions and enable/disable them
Getting the actual URL where the bot is located
Download browser history in .json format
Using the botโs IP and its cookies (reverse proxy)
link https://xss.is/threads/80558/
Product price on the forum : 5.000$
Download: https://system32.ink/d/injecting-scripts-into-web-pages/
๐ฅ2
DataLeak:
๐๐ปLeak haztutienda com : https://system32.ink/d/leak-haztutienda-com/
๐๐ปLeak voiswitch : https://system32.ink/d/leak-voiswitch-net/
๐๐ปLeak unja.ac.id : https://system32.ink/d/leak-unja-ac-id/
Tools:
๐๐ปPyrai - Mirai python variant : https://system32.ink/d/pyrai-mirai-python-variant/
Exploit:
๐๐ปCVE-2023-33246 RocketMQ Remote Code Execution Exploit : https://system32.ink/d/cve-2023-33246-rocketmq-remote-code-execution-exploit/
๐๐ปLeak haztutienda com : https://system32.ink/d/leak-haztutienda-com/
๐๐ปLeak voiswitch : https://system32.ink/d/leak-voiswitch-net/
๐๐ปLeak unja.ac.id : https://system32.ink/d/leak-unja-ac-id/
Tools:
๐๐ปPyrai - Mirai python variant : https://system32.ink/d/pyrai-mirai-python-variant/
Exploit:
๐๐ปCVE-2023-33246 RocketMQ Remote Code Execution Exploit : https://system32.ink/d/cve-2023-33246-rocketmq-remote-code-execution-exploit/
๐1
Forwarded from ๐๐ง๐ค๐ฉ๐ค๐๐ค๐ก ๐๐๐๐
๐ฝ๐ช๐ ๐๐ฎ๐ฅ๐: DOM XSS
๐๐๐ฃ๐ : https://youtube.com/shorts/CGCI_uar67g?feature=share
๐๐๐ฃ๐ : https://youtube.com/shorts/CGCI_uar67g?feature=share
YouTube
DOM XSS
๐ฝ๐ช๐ ๐๐ฎ๐ฅ๐: DOM XSS๐ฟ๐๐จ๐๐ง๐๐ฅ๐ฉ๐๐ค๐ฃ: DOM-based XSS vulnerabilities usually arise when JavaScript takes data from an attacker-controllable source,...