Bykea is likely targeted/compromised by Indian hackers.
pakistani biggest bike ride company hacked ๐
everyone go to twitter and search for #bykea
pakistani biggest bike ride company hacked ๐
everyone go to twitter and search for #bykea
๐2
Forwarded from HackLock
๐ข Exciting News! Introducing our new
BOT : @System32Download_bot ๐ค
We're thrilled to announce the arrival of System32Download bot, your go-to bot for hassle-free file downloads! Now, with a simple forward, you can obtain direct download links for any file you send to our bot.
โ Instant Downloads: Say goodbye to complex processes and waiting times. With System32Download bot , you'll receive the download link immediately, allowing you to access your files in no time.
๐ Security First: Rest assured, your privacy and data security are our top priorities. System32Download bot ensures a secure environment for all file transfers, providing you with peace of mind every step of the way.
For any queries or assistance, don't hesitate to reach out to our friendly support team. Happy downloading!
@MynK0x00
#TelegramBot #DirectLinkDownloader #FileDownloads #Convenience
BOT : @System32Download_bot ๐ค
We're thrilled to announce the arrival of System32Download bot, your go-to bot for hassle-free file downloads! Now, with a simple forward, you can obtain direct download links for any file you send to our bot.
โ Instant Downloads: Say goodbye to complex processes and waiting times. With System32Download bot , you'll receive the download link immediately, allowing you to access your files in no time.
๐ Security First: Rest assured, your privacy and data security are our top priorities. System32Download bot ensures a secure environment for all file transfers, providing you with peace of mind every step of the way.
For any queries or assistance, don't hesitate to reach out to our friendly support team. Happy downloading!
@MynK0x00
#TelegramBot #DirectLinkDownloader #FileDownloads #Convenience
๐ฅDataleak:
๐ฑLeak Us army DB 9GB : https://system32.ink/d/leak-us-army-db/
๐ฑSindad_com website database Leak : https://system32.ink/d/sindad-com-website-database-leak/
๐ฅExploits:
๐ฑCVE-2023-2008 Exploit : https://system32.ink/d/cve-2023-2008-exploit/
๐ฅTools:
๐ฑonedrive_user_enum v2.00 : https://system32.ink/d/onedrive_user_enum-v2-00/
๐ฑNodeCraw (Web Crawling Application): https://system32.ink/d/nodecraw-web-crawling-application/
๐ฅBank SCam Pages:
๐๐ปAmerican Express,
๐๐ปBank BNP Paribas
๐๐ปBank OF America
๐๐ปBankok Bank
๐๐ปChase Bank
๐๐ปDiscover Online Bank
๐๐ปDubai Islamic Bank
๐๐ปHalifax UK Bank
๐๐ปM&T Bank
๐๐ปMKB Bank
๐๐ปRabobank NL
๐๐ปSparkasse Bank
๐๐ปcapitalOne
https://system32.ink/d/all-banks-scam-pages-latest/
๐ฅCourse:
๐ฑStation X - The Complete Cyber Security Course - Volumes 1, 2, 3 & 4 : https://system32.ink/news-feed/p/487/
๐ฅRat & Stealers:
๐ฑEXO STUB Stealer Source Code Leak : https://system32.ink/d/exo-stub-stealer-source-code-leak/
๐ฑAnubis-8.0-RAT : https://system32.ink/d/anubis-8-0-rat/
@crackcodes | crackcodes.in |system32.ink | promcracker.me | mcracker.org
๐ฑLeak Us army DB 9GB : https://system32.ink/d/leak-us-army-db/
๐ฑSindad_com website database Leak : https://system32.ink/d/sindad-com-website-database-leak/
๐ฅExploits:
๐ฑCVE-2023-2008 Exploit : https://system32.ink/d/cve-2023-2008-exploit/
๐ฅTools:
๐ฑonedrive_user_enum v2.00 : https://system32.ink/d/onedrive_user_enum-v2-00/
๐ฑNodeCraw (Web Crawling Application): https://system32.ink/d/nodecraw-web-crawling-application/
๐ฅBank SCam Pages:
๐๐ปAmerican Express,
๐๐ปBank BNP Paribas
๐๐ปBank OF America
๐๐ปBankok Bank
๐๐ปChase Bank
๐๐ปDiscover Online Bank
๐๐ปDubai Islamic Bank
๐๐ปHalifax UK Bank
๐๐ปM&T Bank
๐๐ปMKB Bank
๐๐ปRabobank NL
๐๐ปSparkasse Bank
๐๐ปcapitalOne
https://system32.ink/d/all-banks-scam-pages-latest/
๐ฅCourse:
๐ฑStation X - The Complete Cyber Security Course - Volumes 1, 2, 3 & 4 : https://system32.ink/news-feed/p/487/
๐ฅRat & Stealers:
๐ฑEXO STUB Stealer Source Code Leak : https://system32.ink/d/exo-stub-stealer-source-code-leak/
๐ฑAnubis-8.0-RAT : https://system32.ink/d/anubis-8-0-rat/
@crackcodes | crackcodes.in |system32.ink | promcracker.me | mcracker.org
๐ฅExploring Advanced .htaccess File Attacks๐ฅ
๐๐ปWhat Is .htaccess?
๐๐ปComman Attack Using .htaccess
1.Treating All Files as PHP Code
2.Remote Code Execution (RCE) through PHP Configuration Overwrite
3.Exploiting Cross-Site Scripting (XSS) Vulnerabilities
4.Denial-of-Service (DoS) Attacks:
5.Password Protection Bypass:
5.Redirection and URL Manipulation Techniques:
๐๐ปHardening .htaccess Security
READ: https://www.crackcodes.in/2023/06/exploring-advanced-htaccess-file-attacks.html
๐๐ปWhat Is .htaccess?
๐๐ปComman Attack Using .htaccess
1.Treating All Files as PHP Code
2.Remote Code Execution (RCE) through PHP Configuration Overwrite
3.Exploiting Cross-Site Scripting (XSS) Vulnerabilities
4.Denial-of-Service (DoS) Attacks:
5.Password Protection Bypass:
5.Redirection and URL Manipulation Techniques:
๐๐ปHardening .htaccess Security
READ: https://www.crackcodes.in/2023/06/exploring-advanced-htaccess-file-attacks.html
CVE-2023-20887 VMWare Aria Operations for Networks unauthenticated RCE Exploit
https://system32.ink/d/cve-2023-20887-vmware-aria-operations-for-networks-unauthenticated-rce-exploit/
https://system32.ink/d/cve-2023-20887-vmware-aria-operations-for-networks-unauthenticated-rce-exploit/
Forwarded from CYBER TRICKS ZONE ๐ฎ๐ณ๐ฉ (๐๐ง๐ค๐ฉ๐ค๐๐ค๐ก ๐๐๐๐ )
Hackernoon
The Ultimate Guide to Mastering Nmap and Netcat
Dive into network security with our guide on Nmap & Netcat. Learn their uses, commands, installation, troubleshooting, and ethical practices.
๐๐๐ ๐๐ฃ๐๐๐๐ฉ๐๐ค๐ฃ ๐๐ฃ๐๐ก๐๐ฃ๐๐ง โจ
๐๐๐ฃ๐ : https://twitter.com/thecybertix/status/1668871896916717569?t=8rci-WOXRRn0PuMxBqsV2g&s=19
๐๐๐ฃ๐ : https://twitter.com/thecybertix/status/1668871896916717569?t=8rci-WOXRRn0PuMxBqsV2g&s=19
X (formerly Twitter)
Cybertix (@thecybertix) on X
Access Oneliners from Github:
https://t.co/Lv5AeEDSFl
Subscribe to our YouTube Channel:
https://t.co/xXKr0Ma4jZ
Follow us for Bug Bounty Tips & Tricks ๐ฐ
#bugbountytips #BugBounty #Hacking #sql #Injection #CyberSecurity #securitybreach #bugs #hacks #Tipsโฆ
https://t.co/Lv5AeEDSFl
Subscribe to our YouTube Channel:
https://t.co/xXKr0Ma4jZ
Follow us for Bug Bounty Tips & Tricks ๐ฐ
#bugbountytips #BugBounty #Hacking #sql #Injection #CyberSecurity #securitybreach #bugs #hacks #Tipsโฆ
๐1
๐ฅDatabases:
๐ฑLeak areashopping_eu : https://system32.ink/d/leak-areashopping-eu/
๐ฑLeak sportfood40_ru : https://system32.ink/d/leak-sportfood40-ru/
๐ฑLeak sport-fashion_sk : https://system32.ink/d/leak-sport-fashion-sk/
๐ฅExploits:
๐ฑUbuntu 22.04 - udmabuf, CVE-2023-2008 Exploit : https://system32.ink/d/ubuntu-22-04-udmabuf-cve-2023-2008-exploit/
๐ฑCVE-2022-4262: Incorrect Bytecode Generation by JavaScript Parse POC : https://system32.ink/d/cve-2022-4262-incorrect-bytecode-generation-by-javascript-parse-poc/
๐ฅTools:
๐ฑTheRestarter is a tool is designed to interact with the Windows Restart Manager. : https://system32.ink/d/therestarter-is-a-tool-is-designed-to-interact-with-the-windows-restart-manager/
@crackcodes | crackcodes.in | system32.ink | promcracker.me | mcracker.org
๐ฑLeak areashopping_eu : https://system32.ink/d/leak-areashopping-eu/
๐ฑLeak sportfood40_ru : https://system32.ink/d/leak-sportfood40-ru/
๐ฑLeak sport-fashion_sk : https://system32.ink/d/leak-sport-fashion-sk/
๐ฅExploits:
๐ฑUbuntu 22.04 - udmabuf, CVE-2023-2008 Exploit : https://system32.ink/d/ubuntu-22-04-udmabuf-cve-2023-2008-exploit/
๐ฑCVE-2022-4262: Incorrect Bytecode Generation by JavaScript Parse POC : https://system32.ink/d/cve-2022-4262-incorrect-bytecode-generation-by-javascript-parse-poc/
๐ฅTools:
๐ฑTheRestarter is a tool is designed to interact with the Windows Restart Manager. : https://system32.ink/d/therestarter-is-a-tool-is-designed-to-interact-with-the-windows-restart-manager/
@crackcodes | crackcodes.in | system32.ink | promcracker.me | mcracker.org
Anyone Taking part in Darkwebathon 2023 BY Team ATII Dm @hacklathon
Forwarded from Tสษชแดแดส Pแดษดษขแดษชษด ( trickypenguin.ink )
gmail-osint.activetk.jp
Ghunt online version.
Get info about Google account by email:
- name
- default profile and cover pictures;
- calendar events and timezone;
- Google Maps reviews;
- Google Plus and Google Chat data;
#osint #socmint
Ghunt online version.
Get info about Google account by email:
- name
- default profile and cover pictures;
- calendar events and timezone;
- Google Maps reviews;
- Google Plus and Google Chat data;
#osint #socmint
๐2
Webinar: OSINT: The Ultimate Truth-Seeker on the Internet
Welcome to the "Introduction to OSINT" workshop, where we will cover essential topics for beginners interested in Open-Source Intelligence (OSINT) techniques! In this workshop, you will learn about the fundamentals of OSINT and how to apply them in your investigations.
We'll begin by discussing what OSINT is and how it differs from OSINF (Open-Source Information). We'll also explore the intelligence cycle and how it relates to OSINT investigations. You'll learn about the different phases of the cycle, including planning and direction, collection, processing and exploitation, analysis and production, and dissemination.
Next, we'll delve into technical and non-technical OSINT, explaining the differences between the two. You'll learn how to use tools and techniques like Google search operators, metadata analysis, and social media monitoring to collect information online.
We'll also touch on the topic of Darkweb and explain what it is and how it works. You'll gain an understanding of the difference between the surface web, deep web, and dark web and the challenges associated with conducting OSINT investigations in these areas.
Finally, we'll wrap up the workshop by discussing Darkweb OSINT and how to conduct investigations in the dark web safely and effectively. You'll learn about the legal and ethical considerations involved in dark web investigations, as well as the tools and techniques used to access and gather information from hidden services.
By the end of this workshop, you'll have a solid understanding of OSINT investigations and be able to apply the techniques learned to find valuable information online. Whether you're a student, researcher, or just someone curious about OSINT, this workshop has something for you!
Join us for an interactive and informative session where you can enhance your knowledge and skills in OSINT investigations and uncover the truth behind any online activity!
Date: June 17th, 2023
Venue: Online
Time: 9:30PM to 10:30PM
Contact: community.cyberverse@gmail.com
Register Now: https://forms.gle/y46RfWhJ7H3EahBS9
Welcome to the "Introduction to OSINT" workshop, where we will cover essential topics for beginners interested in Open-Source Intelligence (OSINT) techniques! In this workshop, you will learn about the fundamentals of OSINT and how to apply them in your investigations.
We'll begin by discussing what OSINT is and how it differs from OSINF (Open-Source Information). We'll also explore the intelligence cycle and how it relates to OSINT investigations. You'll learn about the different phases of the cycle, including planning and direction, collection, processing and exploitation, analysis and production, and dissemination.
Next, we'll delve into technical and non-technical OSINT, explaining the differences between the two. You'll learn how to use tools and techniques like Google search operators, metadata analysis, and social media monitoring to collect information online.
We'll also touch on the topic of Darkweb and explain what it is and how it works. You'll gain an understanding of the difference between the surface web, deep web, and dark web and the challenges associated with conducting OSINT investigations in these areas.
Finally, we'll wrap up the workshop by discussing Darkweb OSINT and how to conduct investigations in the dark web safely and effectively. You'll learn about the legal and ethical considerations involved in dark web investigations, as well as the tools and techniques used to access and gather information from hidden services.
By the end of this workshop, you'll have a solid understanding of OSINT investigations and be able to apply the techniques learned to find valuable information online. Whether you're a student, researcher, or just someone curious about OSINT, this workshop has something for you!
Join us for an interactive and informative session where you can enhance your knowledge and skills in OSINT investigations and uncover the truth behind any online activity!
Date: June 17th, 2023
Venue: Online
Time: 9:30PM to 10:30PM
Contact: community.cyberverse@gmail.com
Register Now: https://forms.gle/y46RfWhJ7H3EahBS9
Google Docs
Webinar- OSINT: The Ultimate Truth-Seeker on the Internet
Date: June 17th, 2023
Venue: Online
Time: 9:30PM to 10:30PM
Contact: community.cyberverse@gmail.com
Welcome to the "Introduction to OSINT" workshop, where we will cover essential topics for beginners interested in Open-Source Intelligence (OSINT) techniques!โฆ
Venue: Online
Time: 9:30PM to 10:30PM
Contact: community.cyberverse@gmail.com
Welcome to the "Introduction to OSINT" workshop, where we will cover essential topics for beginners interested in Open-Source Intelligence (OSINT) techniques!โฆ
๐ฝ๐ช๐๐๐ค๐ช๐ฃ๐ฉ๐ฎ ๐๐จ ๐ผ๐
๐๐๐ฃ๐ : https://youtube.com/shorts/E5an7QPrmCE?feature=share
๐๐๐ฃ๐ : https://youtube.com/shorts/E5an7QPrmCE?feature=share
YouTube
Bug Bounty vs AI
๐ด BE MY FRIEND ๐๐๐ฃ๐จ๐ฉ๐๐๐ง๐๐ข (thecybertix): https://www.instagram.com/thecybertix ๐๐๐ฌ๐๐ฉ๐ฉ๐๐ง: https://twitter.com/thecybertix๐๐๐๐ฃ๐ ๐๐๐๐ฃ...
Legion SMTP v6.5 Latest : https://system32.ink/d/legion-smtp-v6-5-latest-2/
Leak icomanda.com : https://system32.ink/d/leak-icomanda-com/
Leak Globant.com corp GHE : https://system32.ink/d/leak-globant-com-corp-ghe/
Leak Turkish football club Trabzonspor : https://system32.ink/d/leak-turkish-football-club-trabzonspor/
@crackcodes | crackcodes.in | system32.ink |
Leak icomanda.com : https://system32.ink/d/leak-icomanda-com/
Leak Globant.com corp GHE : https://system32.ink/d/leak-globant-com-corp-ghe/
Leak Turkish football club Trabzonspor : https://system32.ink/d/leak-turkish-football-club-trabzonspor/
@crackcodes | crackcodes.in | system32.ink |
๐ฝ๐ช๐ ๐๐ฎ๐ฅ๐: Web-Cache Poisoning
๐๐๐ฃ๐ : https://youtube.com/shorts/60n53QpAxfw?feature=share
๐๐๐ฃ๐ : https://youtube.com/shorts/60n53QpAxfw?feature=share
YouTube
Web Cache Poisoning
๐ฝ๐๐ ๐๐๐ฅ๐: Web Cache Poisoning๐ซ๐๐๐๐๐๐๐ฉ๐๐ค๐: Web cache poisoning is a security attack where an attacker manipulates a web cache to serve malic...