Forwarded from wh4tebox
Sir I am hosting a THM giveaway
https://t.me/wh4teboxshop/24
Please participate ๐ฅฐ
Your viewers maybe interestedโค
https://t.me/wh4teboxshop/24
Please participate ๐ฅฐ
Your viewers maybe interestedโค
Forwarded from CrackCodes ๐ฎ๐ณ (HackLock)
เคเฅเคธเคพ เคเฅ เคเคช เคธเคฌ เคฒเฅเค เคเคพเคจเคคเฅ เคนเคฟ เคนเฅเคเคเฅ เคเฅ เคเคพเคซเฅ เคธเคพเคฐเฅ เค
เคงเคฐเฅเคฎเฅ เคเคพเคซเฅ เคเฅเคถเคฟเคถเฅเค เคเคฐ เคฐเคนเฅ เคนเฅ เคธเคจเคพเคคเคจ เคงเคฐเฅเคฎ เคเฅ เค เฅเคธ เคชเคนเฅเคเคเคจเฅ เคเฅ เคคเฅ เคเคธเฅ เคเฅ เคฒเคฟเค เคฏเคน เคเฅเคจเคฒ เคฌเคจเคพเคฏเคพ เคเคฏเคพ เคนเฅ !!
เคเคธ เคเฅเคจเคฒ เคฎเฅ เคนเคฎ เคธเคจเคพเคคเคจ เคงเคฐเฅเคฎ เคธเฅ เคเฅเฅเฅ เคนเฅเค เคเคฟเคคเคจเฅ เคญเฅ เคเคฒเคคเคซเฅเคฎเคฟเคฏเคพ เคฏเคพ เคเคฒเคค เคฌเคพเคคเฅเค เคซเฅเคฒเคพเค เคเคพเคฐเฅ เคนเฅ เคเคจเคเคพ เคเคเคกเคจ เคเคฟเคฏเคพ เคเคพเคฏเฅเคเคพ เคเคฐ เคธเคจเคพเคคเคจ เคงเคฐเฅเคฎ เคเฅ เคถเคฟเคเฅเคทเคพ เคฆเฅ เคเคพเคเคเฅ !!
https://t.me/sanatandharmCDI
เคเคธ เคเฅเคจเคฒ เคฎเฅ เคนเคฎ เคธเคจเคพเคคเคจ เคงเคฐเฅเคฎ เคธเฅ เคเฅเฅเฅ เคนเฅเค เคเคฟเคคเคจเฅ เคญเฅ เคเคฒเคคเคซเฅเคฎเคฟเคฏเคพ เคฏเคพ เคเคฒเคค เคฌเคพเคคเฅเค เคซเฅเคฒเคพเค เคเคพเคฐเฅ เคนเฅ เคเคจเคเคพ เคเคเคกเคจ เคเคฟเคฏเคพ เคเคพเคฏเฅเคเคพ เคเคฐ เคธเคจเคพเคคเคจ เคงเคฐเฅเคฎ เคเฅ เคถเคฟเคเฅเคทเคพ เคฆเฅ เคเคพเคเคเฅ !!
https://t.me/sanatandharmCDI
The Full Stack React Course 2023 Free
By developedbyed.com
In this course, youโll learn to create an e-commerce application using following technologies:
๐ Next.js
๐ Tailwind CSS
๐ PostgreSQL
๐ Prisma
๐ Daisy UI
๐ Stripe
๐ Zustand
๐ Next-auth
๐ Vercel for Deployment
https://telelearn.in/the-full-stack-react-course-2023-free/
By developedbyed.com
In this course, youโll learn to create an e-commerce application using following technologies:
๐ Next.js
๐ Tailwind CSS
๐ PostgreSQL
๐ Prisma
๐ Daisy UI
๐ Stripe
๐ Zustand
๐ Next-auth
๐ Vercel for Deployment
https://telelearn.in/the-full-stack-react-course-2023-free/
CrackCodes ๐ฎ๐ณ pinned ยซhttps://system32.ink/confluence-server-cve-2023-22518-exploit/ยป
Forwarded from โKushwฤhฤ Jeeโ
Happy Diwali in Advance๐ to all our Hindu friends and supporters! May the festival of lights bring joy, prosperity, and blessings to you and your loved ones.
Exciting news! We're launching a new Hindu supporter news channel dedicated to providing accurate and unbiased coverage of important issues for the Hindu community. This channel will be a valuable resource for sharing underrepresented news and perspectives. Best wishes to the team behind this effort. Jai Shri Ram!
Follow us ๐ค
Telegram - @IndicWatch
https://instagram.com/indicwatch?igshid=NzZlODBkYWE4Ng==
https://twitter.com/IndicWatch
Exciting news! We're launching a new Hindu supporter news channel dedicated to providing accurate and unbiased coverage of important issues for the Hindu community. This channel will be a valuable resource for sharing underrepresented news and perspectives. Best wishes to the team behind this effort. Jai Shri Ram!
Follow us ๐ค
Telegram - @IndicWatch
https://instagram.com/indicwatch?igshid=NzZlODBkYWE4Ng==
https://twitter.com/IndicWatch
What Type Of Materials You Want?
Final Results
15%
Database
21%
Exploits & Poc
47%
Courses
16%
Malwares And Strealer
๐2
Forwarded from Cybertix
๐จ๐จ๐๐ฒ๐น๐น๐ผ ๐๐ถ๐๐๐ ๐ฅ๐ฎ๐ป๐๐ผ๐บ๐๐ฎ๐ฟ๐ฒ ๐๐
๐ฝ๐น๐ผ๐ถ๐๐ถ๐ป๐ด ๐๐ฝ๐ฎ๐ฐ๐ต๐ฒ... ๐จ๐จ
๐จ
๐ช๐ฎ๐๐ฐ๐ต ๐ก๐ผ๐: https://youtube.com/shorts/V3VaFeoVZ2U?si=fXTqKvlYc0tqXdeO
๐จ
๐ช๐ฎ๐๐ฐ๐ต ๐ก๐ผ๐: https://youtube.com/shorts/V3VaFeoVZ2U?si=fXTqKvlYc0tqXdeO
YouTube
HelloKitty Ransomware Exploiting Apache
๐๐๐๐จ๐๐ช๐๐๐: https://cybersecuritynews.com/hellokitty-ransomware-apache-activemq/๐๐ฑ๐ค๐๐ฃ ๐ค๐๐ง ๐ช๐ค๐๐ข๐๐ฃ๐๐ฉ๐ : ๐ด๐๐๐๐๐จ๐๐ฅ๐ : https://w...
๐2
Forwarded from Cybertix
๐๐ฉ๐-๐ฎ๐ฌ๐ฎ๐ฏ-๐ฎ๐ฎ๐ฑ๐ญ๐ด - Improper Authorization Vulnerability in Confluence Data Center and Server ๐ข๐ป๐ฒ๐น๐ถ๐ป๐ฒ๐ฟ
๐๐๐ฃ๐ :
https://twitter.com/thecybertix/status/1722510192368328798?t=h10VjaG5Y-GUIM0irSWDMg&s=19
๐๐๐ฃ๐ :
https://twitter.com/thecybertix/status/1722510192368328798?t=h10VjaG5Y-GUIM0irSWDMg&s=19
Forwarded from Angry Saffron & Treeni (ใ
ค)
Pakistan tops the chart yet again in spreading global terrorism.
14 Pakistanis have been arrested for Islamic terror activities in Spain.
๐ https://twitter.com/_treeni/status/1722499792759365833
๐ ๐บ@AngrySaffron
14 Pakistanis have been arrested for Islamic terror activities in Spain.
Please open Telegram to view this post
VIEW IN TELEGRAM
๐4
Forwarded from CYBER TRICKS ZONE ๐ฎ๐ณ๐ฉ
Media is too big
VIEW IN TELEGRAM
Safe your Wireless Network.mp4
๐1
Forwarded from Cybertix
๐๐๐ด: Server allows TCP and UDP proxying to internal Network
๐๐ผ๐๐ป๐๐: ๐ฏ๐ฑ๐ฌ๐ฌ$ ๐
๐ฉ๐ถ๐ฑ๐ฒ๐ผ ๐ฃ๐ผ๐: https://youtu.be/DVofk14u_sU?si=mufceg26zW0oqIv_
Please Like & Subscribe to our YouTube channel. ๐
.
.
.
Coming Soon, with ๐ฝ๐ช๐ ๐ฝ๐ค๐ช๐ฃ๐ฉ๐ฎ ๐๐ก๐๐ฎ๐ก๐๐จ๐ฉ ๐ฅ
๐๐ผ๐๐ป๐๐: ๐ฏ๐ฑ๐ฌ๐ฌ$ ๐
๐ฉ๐ถ๐ฑ๐ฒ๐ผ ๐ฃ๐ผ๐: https://youtu.be/DVofk14u_sU?si=mufceg26zW0oqIv_
Please Like & Subscribe to our YouTube channel. ๐
.
.
.
Coming Soon, with ๐ฝ๐ช๐ ๐ฝ๐ค๐ช๐ฃ๐ฉ๐ฎ ๐๐ก๐๐ฎ๐ก๐๐จ๐ฉ ๐ฅ
YouTube
Server allows TCP and UDP proxying to internal network | Got Bounty of $ 3500๐ค
๐๐ฝ๐๐ ๐๐๐ฅ๐๐ง๐: https://hackerone.com/reports/333419
๐๐ฑ๐ค๐๐ฃ ๐ค๐๐ง ๐ช๐ค๐๐ข๐๐ฃ๐๐ฉ๐ :
๐ด๐๐๐๐๐จ๐๐ฅ๐ https://whatsapp.com/channel/0029VaA7sQ6KLaHx1kHh533H
๐ด๐๐๐ก๐๐๐๐๐
https://t.me/thecybertix
๐ด BE MY FRIEND
๐๐๐ฃ๐จ๐ฉ๐๐๐ง๐๐ข : https://www.instagram.com/thecybertix/
๐๐๐ฌ๐๐ฉ๐ฉ๐๐ง:โฆ
๐๐ฑ๐ค๐๐ฃ ๐ค๐๐ง ๐ช๐ค๐๐ข๐๐ฃ๐๐ฉ๐ :
๐ด๐๐๐๐๐จ๐๐ฅ๐ https://whatsapp.com/channel/0029VaA7sQ6KLaHx1kHh533H
๐ด๐๐๐ก๐๐๐๐๐
https://t.me/thecybertix
๐ด BE MY FRIEND
๐๐๐ฃ๐จ๐ฉ๐๐๐ง๐๐ข : https://www.instagram.com/thecybertix/
๐๐๐ฌ๐๐ฉ๐ฉ๐๐ง:โฆ
โค1
Forwarded from CYBER TRICKS ZONE ๐ฎ๐ณ๐ฉ
Here's a list of 100 cybersecurity tools:
1. Wireshark
2. Nmap
3. Metasploit
4. Burp Suite
5. Snort
6. Aircrack-ng
7. John the Ripper
8. Maltego
9. Cain and Abel
10. Nessus
11. OpenVAS
12. Wireshark
13. Netcat
14. tcpdump
15. OSSEC
16. ModSecurity
17. Hydra
18. Acunetix
19. Qualys
20. OWASP ZAP
21. Grep
22. OWASP Dependency-Check
23. Suricata
24. OSQuery
25. AlienVault OSSIM
26. OSSEC
27. Wfuzz
28. OSQuery
29. Fail2ban
30. Nikto
31. SQLMap
32. Zeek (formerly Bro)
33. LogRhythm
34. QRadar
35. Snorby
36. QRadar
37. IronPort
38. AlienVault USM
39. Cisco Umbrella
40. SolarWinds
41. SolarWinds
42. ManageEngine OpManager
43. Nagios
44. Splunk
45. ELK Stack
46. Stealthwatch
47. Intrusion Detection System (IDS)
48. Intrusion Prevention System (IPS)
49. Kali Linux
50. GFI LanGuard
51. Wireshark
52. tcpdump
53. Squid
54. Suricata
55. FireEye
56. Palo Alto Networks
57. Blue Coat (Symantec)
58. Forcepoint (formerly Websense)
59. Crowdstrike
60. Carbon Black
61. Fiddler
62. OWASP WebGoat
63. OWASP Mutillidae
64. OWASP Juice Shop
65. Security Onion
66. OSSEC
67. Bro (Zeek)
68. OWASP ZAP
69. Cuckoo Sandbox
70. ClamAV
71. Snort
72. Bro (Zeek)
73. HAVP
74. Fiddler
75. Pyrit
76. WPScan
77. W3AF
78. Tails
79. Nipper
80. Wfuzz
81. THOR
82. Wazuh
83. Shodan
84. TCPReplay
85. OWASP Dependency-Check
86. RATools
87. Xplico
88. WhatWeb
89. OWASP OWTF
90. AIDE
91. Cuckoo Sandbox
92. OSQuery
93. Sagan
94. Snorby
95. Nikto
96. Lynis
97. Wazuh
98. OSQuery
99. Security Onion
100. OWASP OWTF
1. Wireshark
2. Nmap
3. Metasploit
4. Burp Suite
5. Snort
6. Aircrack-ng
7. John the Ripper
8. Maltego
9. Cain and Abel
10. Nessus
11. OpenVAS
12. Wireshark
13. Netcat
14. tcpdump
15. OSSEC
16. ModSecurity
17. Hydra
18. Acunetix
19. Qualys
20. OWASP ZAP
21. Grep
22. OWASP Dependency-Check
23. Suricata
24. OSQuery
25. AlienVault OSSIM
26. OSSEC
27. Wfuzz
28. OSQuery
29. Fail2ban
30. Nikto
31. SQLMap
32. Zeek (formerly Bro)
33. LogRhythm
34. QRadar
35. Snorby
36. QRadar
37. IronPort
38. AlienVault USM
39. Cisco Umbrella
40. SolarWinds
41. SolarWinds
42. ManageEngine OpManager
43. Nagios
44. Splunk
45. ELK Stack
46. Stealthwatch
47. Intrusion Detection System (IDS)
48. Intrusion Prevention System (IPS)
49. Kali Linux
50. GFI LanGuard
51. Wireshark
52. tcpdump
53. Squid
54. Suricata
55. FireEye
56. Palo Alto Networks
57. Blue Coat (Symantec)
58. Forcepoint (formerly Websense)
59. Crowdstrike
60. Carbon Black
61. Fiddler
62. OWASP WebGoat
63. OWASP Mutillidae
64. OWASP Juice Shop
65. Security Onion
66. OSSEC
67. Bro (Zeek)
68. OWASP ZAP
69. Cuckoo Sandbox
70. ClamAV
71. Snort
72. Bro (Zeek)
73. HAVP
74. Fiddler
75. Pyrit
76. WPScan
77. W3AF
78. Tails
79. Nipper
80. Wfuzz
81. THOR
82. Wazuh
83. Shodan
84. TCPReplay
85. OWASP Dependency-Check
86. RATools
87. Xplico
88. WhatWeb
89. OWASP OWTF
90. AIDE
91. Cuckoo Sandbox
92. OSQuery
93. Sagan
94. Snorby
95. Nikto
96. Lynis
97. Wazuh
98. OSQuery
99. Security Onion
100. OWASP OWTF
๐1
Forwarded from CYBER TRICKS ZONE ๐ฎ๐ณ๐ฉ
5 Youtube Channels to Learn JavaScript:
1. Hitesh Choudhary
2. Akshay Saini
3. Traversy Media
4. Net Ninja
5. Codevolution
1. Hitesh Choudhary
2. Akshay Saini
3. Traversy Media
4. Net Ninja
5. Codevolution
Forwarded from CYBER TRICKS ZONE ๐ฎ๐ณ๐ฉ
HTTPS, SSL Handshake, and Data Encryption Explained to Kids.
HTTPS: Safeguards your data from eavesdroppers and breaches. Understand how encryption and digital certificates create an impregnable shield.
SSL Handshake: Behind the Scenes โ Witness the cryptographic protocols that establish a secure connection. Experience the intricate exchange of keys and negotiation.
Secure Data Transmission: Navigating the Tunnel โ Journey through the encrypted tunnel forged by HTTPS. Learn how your information travels while shielded from cyber threats.
HTML's Role: Peek into HTML's role in structuring the web. Uncover how hyperlinks and content come together seamlessly. And why is it called HYPER TEXT.
Over to you: In this ever-evolving digital landscape, what emerging technologies do you foresee shaping the future of cybersecurity or the web?
HTTPS: Safeguards your data from eavesdroppers and breaches. Understand how encryption and digital certificates create an impregnable shield.
SSL Handshake: Behind the Scenes โ Witness the cryptographic protocols that establish a secure connection. Experience the intricate exchange of keys and negotiation.
Secure Data Transmission: Navigating the Tunnel โ Journey through the encrypted tunnel forged by HTTPS. Learn how your information travels while shielded from cyber threats.
HTML's Role: Peek into HTML's role in structuring the web. Uncover how hyperlinks and content come together seamlessly. And why is it called HYPER TEXT.
Over to you: In this ever-evolving digital landscape, what emerging technologies do you foresee shaping the future of cybersecurity or the web?
๐1