CrackCodes ๐ฎ๐ณ pinned ยซhttps://system32.ink/icex-malware-v3-source-code IceX Malware V3 Source Codeยป
Forwarded from CYBER TRICKS ZONE ๐ฎ๐ณ๐ฉ
Face difficulties in finding bugs. Then you want more knowledge and skill.
Try --> bugbountyhunting.com
A large collection of articles with examples of finding different types of vulnerabilities: XSS, SSRF, SQLI, RCE, IDOR.
Try --> bugbountyhunting.com
A large collection of articles with examples of finding different types of vulnerabilities: XSS, SSRF, SQLI, RCE, IDOR.
Forwarded from OSINT AMBITION (Dheeraj Yadav)
Tools for detecting generative ai
For images
https://www.aiornot.com/
https://illuminarty.ai/en/
For written texts -
https://contentatscale.ai/ai-content-detector/
https://copyleaks.com/ai-content-detector
https://gptzero.me/
For voice -
https://aivoicedetector.com/
https://elevenlabs.io/ai-speech-classifier
Mixed -
https://hivemoderation.com/ai-generated-content-detection
Their exist many other tools but we personally have tried and found these most efficient among all we tried.
Join @osintambition for more.
For images
https://www.aiornot.com/
https://illuminarty.ai/en/
For written texts -
https://contentatscale.ai/ai-content-detector/
https://copyleaks.com/ai-content-detector
https://gptzero.me/
For voice -
https://aivoicedetector.com/
https://elevenlabs.io/ai-speech-classifier
Mixed -
https://hivemoderation.com/ai-generated-content-detection
Their exist many other tools but we personally have tried and found these most efficient among all we tried.
Join @osintambition for more.
Aiornot
AI Detector - AI Checker for text, image, music & video
AI or Not is the leading AI detector for all content types: text (ChatGPT, Claude), image (Midjourney, 4o), music (Suno, Udio) & video (Veo, Kling)
Forwarded from Cybertix
How to Change IP Every 5 seconds On Linux
1.Clone these 2 GitHub Repos :-
2.Then Run this Command
3.This is working on linux system, Go to this directory and delete the # sign in the lines starting with the control port and hash
write sudo nano /etc/tor/torrc and record the number given to the hashed part.
4.Then Run these commands
5.Now Open the tor switches directory and run it
enter the password before you set ,Set the IP address Duration and the IP address changes every 5 seconds
Its done, Now the IP will change every 5 seconds.
โฌ๐Share & Support๐ โฌ
JOIN:-- https://t.me/thecybertix
1.Clone these 2 GitHub Repos :-
git clone https://github.com/ruped24/toriptables2.git
git clone https://github.com/ruped24/tor_ip_switcher.git
2.Then Run this Command
sudo apt-get install tor
sudo service tor start
3.This is working on linux system, Go to this directory and delete the # sign in the lines starting with the control port and hash
sudo nano /etc/tor/torrc
tor --hash-password
write sudo nano /etc/tor/torrc and record the number given to the hashed part.
4.Then Run these commands
cd toriptables2
python toriplables2.py -l
5.Now Open the tor switches directory and run it
cd tor_ip_switcher
python tor_ip_switcher
enter the password before you set ,Set the IP address Duration and the IP address changes every 5 seconds
Its done, Now the IP will change every 5 seconds.
โฌ๐Share & Support๐ โฌ
JOIN:-- https://t.me/thecybertix
๐2
Forwarded from OSINT AMBITION (Dheeraj Yadav)
Check if your email has been breached -
#osint #opsec #privacy #security #infosec #cybersec
https://haveibeenpwned.com/
https://www.breachdirectory.org/
https://leak-lookup.com/ (unverified)
https://snusbase.com/ (unverified)
https://dehashed.com/
https://intelx.io/
https://leakpeek.com/
https://search.0t.rocks/
https://monitor.firefox.com/
Join @osintambition for more.
#osint #opsec #privacy #security #infosec #cybersec
https://haveibeenpwned.com/
https://www.breachdirectory.org/
https://leak-lookup.com/ (unverified)
https://snusbase.com/ (unverified)
https://dehashed.com/
https://intelx.io/
https://leakpeek.com/
https://search.0t.rocks/
https://monitor.firefox.com/
Join @osintambition for more.
Have I Been Pwned
Have I Been Pwned: Check if your email address has been exposed in a data breach
Have I Been Pwned allows you to check whether your email address has been exposed in a data breach.
๐2
https://system32.ink/vmware-workstation-pro-17.5-activated-download/
VMware Workstation Pro 17.5 Download
๐3
Forwarded from Cybertix
๐๐ฑ๐ฑ ๐๐ต๐ถ๐ ๐ฅ๐ฒ๐ฐ๐ผ๐ป ๐ฆ๐๐ฒ๐ฝ ๐ถ๐ป ๐๐ผ๐๐ฟ ๐ ๐ฒ๐๐ต๐ผ๐ฑ๐ผ๐น๐ผ๐ด๐ ๐ก๐ผ๐ ๐ฒ๐๐ป
๐๐ถ๐ป๐ธ: https://youtu.be/JTiZgvPQwC4?si=dSChLNgitc9jbIoB
๐ฃ๐น๐ฒ๐ฎ๐๐ฒ ๐๐ต๐ฎ๐ฟ๐ฒ ๐๐ผ๐๐ฟ ๐ฉ๐ถ๐ฒ๐๐ & ๐ ๐ฎ๐ธ๐ฒ ๐๐๐ฟ๐ฒ ๐๐ผ๐ ๐ฆ๐๐ฏ๐๐ฐ๐ฟ๐ถ๐ฏ๐ฒ ๐ถ๐ ๐ณ๐ผ๐ฟ ๐บ๐ผ๐ฟ๐ฒ ๐๐บ๐ฎ๐๐ถ๐ป๐ด ๐ฉ๐ถ๐ฑ๐ฒ๐ผ๐๐ฅ
๐๐ถ๐ป๐ธ: https://youtu.be/JTiZgvPQwC4?si=dSChLNgitc9jbIoB
๐ฃ๐น๐ฒ๐ฎ๐๐ฒ ๐๐ต๐ฎ๐ฟ๐ฒ ๐๐ผ๐๐ฟ ๐ฉ๐ถ๐ฒ๐๐ & ๐ ๐ฎ๐ธ๐ฒ ๐๐๐ฟ๐ฒ ๐๐ผ๐ ๐ฆ๐๐ฏ๐๐ฐ๐ฟ๐ถ๐ฏ๐ฒ ๐ถ๐ ๐ณ๐ผ๐ฟ ๐บ๐ผ๐ฟ๐ฒ ๐๐บ๐ฎ๐๐ถ๐ป๐ด ๐ฉ๐ถ๐ฑ๐ฒ๐ผ๐๐ฅ
YouTube
03 Recon - 404 Endpoints ๐คฏ๐ฅ#cybersecurity #bounty #money #freelancing #india #technology #hacker
๐๐ฑ๐ค๐๐ฃ ๐ค๐๐ง ๐ช๐ค๐๐ข๐๐ฃ๐๐ฉ๐ :
๐ด๐๐๐๐๐จ๐๐ฅ๐ https://whatsapp.com/channel/0029VaA7sQ6KLaHx1kHh533H
๐ด๐๐๐ก๐๐๐๐๐
https://t.me/thecybertix
๐ด BE MY FRIEND
๐๐๐ฃ๐จ๐ฉ๐๐๐ง๐๐ข : https://www.instagram.com/thecybertix/
๐๐๐ฌ๐๐ฉ๐ฉ๐๐ง: : https://twitter.com/thecybertix
๐๐๐๐ฃ๐ ๐๐๐๐ฃ:โฆ
๐ด๐๐๐๐๐จ๐๐ฅ๐ https://whatsapp.com/channel/0029VaA7sQ6KLaHx1kHh533H
๐ด๐๐๐ก๐๐๐๐๐
https://t.me/thecybertix
๐ด BE MY FRIEND
๐๐๐ฃ๐จ๐ฉ๐๐๐ง๐๐ข : https://www.instagram.com/thecybertix/
๐๐๐ฌ๐๐ฉ๐ฉ๐๐ง: : https://twitter.com/thecybertix
๐๐๐๐ฃ๐ ๐๐๐๐ฃ:โฆ
Hey Hunters and Hackers Subdominator now have been improved and come with a new version with new features it supports now output redirection and more api integration like shodan and hunter.how and with more concurrency and accuracy in results with lot of configurations and also support oneliners with other tool to improve your reconnaissance efficitently with oneliner by combing the results with other tools to know more visit here: https://github.com/sanjai-AK47/Subdominator
GitHub
GitHub - RevoltSecurities/Subdominator: SubDominator helps you discover subdomains associated with a target domain efficientlyโฆ
SubDominator helps you discover subdomains associated with a target domain efficiently and with minimal impact for your Bug Bounty - RevoltSecurities/Subdominator
๐3
https://system32.ink/acunetix-v23.9.231020153-linux-premium-full-activated/
Acunetix v23.9.231020153 Linux Premium Full Activated
Linux VersionForwarded from Team-Network-Nine ๐ฎ๐ณ
INSIDE BONGLADEASH
SOFTWARE SOLUTION ;)
Greetz to
#Team ucc
#Team DarkCyber Warrior
#Team BlackDragonsec
#Team NWH Security
#KERALA CYBER BLACK SQUAD
#Kerala Cyber Xtractors
#INDIAN CYBER SANATANI
#silent-one
#IndianCyberForce
#operationallred
For Truly This Reality is a Hell
SOFTWARE SOLUTION ;)
Greetz to
#Team ucc
#Team DarkCyber Warrior
#Team BlackDragonsec
#Team NWH Security
#KERALA CYBER BLACK SQUAD
#Kerala Cyber Xtractors
#INDIAN CYBER SANATANI
#silent-one
#IndianCyberForce
#operationallred
For Truly This Reality is a Hell
Forwarded from Team-Network-Nine ๐ฎ๐ณ
Indonesia turbine Control
system hacked by Team-Network-Nine
Greetz to
#Team ucc
#Team DarkCyber Warrior
#Team BlackDragonsec
#Team NWH Security
#KERALA CYBER BLACK SQUAD
#Kerala Cyber Xtractors
#INDIAN CYBER SANATANI
#silent-one
#IndianCyberForce
#operationallred
For Truly This Reality is a Hell
system hacked by Team-Network-Nine
Greetz to
#Team ucc
#Team DarkCyber Warrior
#Team BlackDragonsec
#Team NWH Security
#KERALA CYBER BLACK SQUAD
#Kerala Cyber Xtractors
#INDIAN CYBER SANATANI
#silent-one
#IndianCyberForce
#operationallred
For Truly This Reality is a Hell
๐1
๐4