This media is not supported in your browser
VIEW IN TELEGRAM
https://tinyurl.com/yce7mxek
Mail as soon as possible
Today is last day
๐๐๐ฉ๐ฉRam Ram๐ฉ๐ฉ๐๐
Mail as soon as possible
Today is last day
๐๐๐ฉ๐ฉRam Ram๐ฉ๐ฉ๐๐
๐ฅ9๐2โก1
๐ซก Onimai Rat v1.7.1 Leaked By ONIMAI FUCKERS๐ฎ
Please open Telegram to view this post
VIEW IN TELEGRAM
โคโ๐ฅ8๐1
๐ VICIdial Unauthenticated SQLi to RCE (CVE-2024-8503 and CVE-2024-8504) Exploit๐ฎ
Please open Telegram to view this post
VIEW IN TELEGRAM
๐2
Forwarded from OSINT AMBITION (Dheeraj | OSINTAmbition)
Free Threat Intelligence Tools by Hudson Rock
- Search for Compromised Corporate & Supply Chain Infrastructure
- Search for Compromised Employees, Customers, Users & Partners
- Discover the Password Hygiene Used by Any Company
- Use the Technology Profiler to Discover which Companies are Using a Technology
- Search for Compromised Android App Users
๐ https://www.hudsonrock.com/threat-intelligence-cybercrime-tools
Join @osintambition for more.
- Search for Compromised Corporate & Supply Chain Infrastructure
- Search for Compromised Employees, Customers, Users & Partners
- Discover the Password Hygiene Used by Any Company
- Use the Technology Profiler to Discover which Companies are Using a Technology
- Search for Compromised Android App Users
๐ https://www.hudsonrock.com/threat-intelligence-cybercrime-tools
Join @osintambition for more.
Hudson Rock
Hudson Rock - Infostealer Intelligence Solutions
Powered by Hudson Rock's continuously augmented cybercrime database, composed of millions of machines compromised by Infostealers in global malware spreading campaigns.
Forwarded from ๐๐๐ ๐๐๐๐๐ ๐๐๐๐๐๐๐ โก๏ธ [offline]
Introducing Our Osint Bot
@night_osint_bot
@night_osint_bot
@night_osint_bot
Use This For Educational Purpose Or Other Things๐ฎโโ๏ธ
@night_osint_bot
@night_osint_bot
@night_osint_bot
Use This For Educational Purpose Or Other Things
Please open Telegram to view this post
VIEW IN TELEGRAM
๐ฅ Google Chromium V8 Engine Unauthorized Access or Execution Of Malicious Code Exploit๐ป
Please open Telegram to view this post
VIEW IN TELEGRAM
๐2
Forwarded from [ ๐๐ ] OFFLINE WRICK
Forwarded from OSINT AMBITION (Dheeraj | OSINTAmbition)
Wednesday Updates #14 is out now.
Highlights - Master Phone number OSINT, Learn about data breaches, #OSINTweek, geolocating public transport, upcoming OSINT events and tool updates...
https://osintupdates.com/p/wednesday-updates-14
#osint #osintforgood #socmint #osinttools #osintnews #weeklyupdate
Highlights - Master Phone number OSINT, Learn about data breaches, #OSINTweek, geolocating public transport, upcoming OSINT events and tool updates...
https://osintupdates.com/p/wednesday-updates-14
#osint #osintforgood #socmint #osinttools #osintnews #weeklyupdate
Osintupdates
Wednesday Updates #14
Master Phone number OSINT, Learn about data breaches, #OSINTweek, geolocating public transport, upcoming OSINT events and tool updates...
To commemorate 75 years of the Territorial Army, Terrier Cyber Quest 2024 is being organized by the Territorial Army in collaboration with CyberPeace.
Looking forward to see you all at *Terrier Cyber Quest 2024* in New Delhi.
*Please donโt forget to register as registration deadline is 20th September.*
Register now at https://www.cyberchallenge.in/
Looking forward to see you all at *Terrier Cyber Quest 2024* in New Delhi.
*Please donโt forget to register as registration deadline is 20th September.*
Register now at https://www.cyberchallenge.in/
โค4๐พ4โก2๐2๐1
Media is too big
VIEW IN TELEGRAM
HOW TO CLONE A WEBSITE (COMPLETE TUTORIAL)
DOWNLOAD LINKS -
WINDOWS - https://download.httrack.com/cserv.php3?File=httrack.exe
64 BIT WINDOWS - https://download.httrack.com/cserv.php3?File=httrack_x64.exe
LINUX - https://download.httrack.com/cserv.php3?File=httrack.tar.gz
ANDROID - https://play.google.com/store/apps/details?id=com.httrack.android
AUTHOR & CREATOR - MR SUDO (@II_SUDO_II)
โโโโโโโโโโโโโโโ
โก๏ธ Join For More :- @GodGeeks
โโโโโโโโโโโโโโโ
DOWNLOAD LINKS -
WINDOWS - https://download.httrack.com/cserv.php3?File=httrack.exe
64 BIT WINDOWS - https://download.httrack.com/cserv.php3?File=httrack_x64.exe
LINUX - https://download.httrack.com/cserv.php3?File=httrack.tar.gz
ANDROID - https://play.google.com/store/apps/details?id=com.httrack.android
AUTHOR & CREATOR - MR SUDO (@II_SUDO_II)
โโโโโโโโโโโโโโโ
โก๏ธ Join For More :- @GodGeeks
โโโโโโโโโโโโโโโ
โคโ๐ฅ7๐3
๐คก NanoCore Rat Malware๐ฎ
Please open Telegram to view this post
VIEW IN TELEGRAM
โคโ๐ฅ2๐2
Forwarded from ๐๐๐ ๐๐๐๐๐ ๐๐๐๐๐๐๐ โก๏ธ [offline]
๐จ Operation Karma: Last Phase ๐จ
Today, we achieved another victory. A malicious website disguised as an APK mod provider, spreading ransomware and RATs (Remote Access Trojans), has been shut down. This site was targeting innocent users in the name of Android APKs, putting their personal data and privacy at risk. Weโre here to ensure that such cybercriminals have no place to hide.
๐ Our Goal: Cybersecurity for All ๐
The internet belongs to its users. We aim to protect every digital citizen from malicious actors. If youโre spreading malware, consider yourself marked โ we are always watching.
๐ This may be our last hacktivism act for now ๐
The Night Hunters are taking a step back... but we will return in March 2025. This isn't goodbye โ itโs just a pause. When the time comes, weโll be back, stronger than ever, to continue our mission of cyber justice.
Stay vigilant. Stay safe.
Today, we achieved another victory. A malicious website disguised as an APK mod provider, spreading ransomware and RATs (Remote Access Trojans), has been shut down. This site was targeting innocent users in the name of Android APKs, putting their personal data and privacy at risk. Weโre here to ensure that such cybercriminals have no place to hide.
๐ Our Goal: Cybersecurity for All ๐
The internet belongs to its users. We aim to protect every digital citizen from malicious actors. If youโre spreading malware, consider yourself marked โ we are always watching.
๐ This may be our last hacktivism act for now ๐
The Night Hunters are taking a step back... but we will return in March 2025. This isn't goodbye โ itโs just a pause. When the time comes, weโll be back, stronger than ever, to continue our mission of cyber justice.
Stay vigilant. Stay safe.
โค7๐ฅ1
Forwarded from ๐๐๐ ๐๐๐๐๐ ๐๐๐๐๐๐๐ โก๏ธ [offline]
Also As This Is Our Final Goodbye For This Year We Have Suspended Almost 50+ Websites Which Were Spreading Child Por*ography
Bravo Six Going Dark
Take Care Everyone
โค7๐5๐ฅ1
Forwarded from INDIAN CYBER MAFIA
Government of Bangladesh
National Tuberculosis Control Programme website has been H@cked
https://www.ntp.gov.bd
https://mail.ntp.gov.bd
Regards
INDIAN CYBER MAFIA
OFFICIAL HALALA FATHER OF ALL RADICAL ISLAMIC KIDS
National Tuberculosis Control Programme website has been H@cked
https://www.ntp.gov.bd
https://mail.ntp.gov.bd
Regards
INDIAN CYBER MAFIA
OFFICIAL HALALA FATHER OF ALL RADICAL ISLAMIC KIDS
โค9๐ฅ4๐3
๐ป NecroWord - Embed Payload Using Undetect Macros๐ฉ
Please open Telegram to view this post
VIEW IN TELEGRAM
โค2
Forwarded from OSINT AMBITION (Dheeraj | OSINTAmbition)
Wednesday Updates #15 is out now.
Highlights: New OSINT Resources collections, interesting case studies, learn geolocation, upcoming webinar, new osint tools and many more...
https://osintupdates.com/p/wednesday-updates-15
Join @osintambition for more.
#osint #osintforgood #socmint #osinttools #osintnews #weeklyupdate
Highlights: New OSINT Resources collections, interesting case studies, learn geolocation, upcoming webinar, new osint tools and many more...
https://osintupdates.com/p/wednesday-updates-15
Join @osintambition for more.
#osint #osintforgood #socmint #osinttools #osintnews #weeklyupdate
Osintupdates
Wednesday Updates #15
New OSINT Resources collections, interesting case studies, learn geolocation, upcoming webinar, new osint tools and many more...
๐2
This media is not supported in your browser
VIEW IN TELEGRAM
๐ฅ CVE-2024-38200 - Microsoft Office NTLMv2 Exploit๐ฅ
Please open Telegram to view this post
VIEW IN TELEGRAM
CBI conducted coordinated searches at 32 different places across Pune, Hyderabad, Ahmedabad and Vishakhapatnam from the late evening of 26th September.
CBI was able to intercept 170 persons engaged in ongoing online criminal activities across four call centres.
CBI has so far placed under arrest 26 key accused persons (10 from Pune, 05 from Hyderabad and 11 from Visakhapatnam), while investigation and questioning on role of other workers at these illegal call centres is ongoing.
CBI was able to intercept 170 persons engaged in ongoing online criminal activities across four call centres.
CBI has so far placed under arrest 26 key accused persons (10 from Pune, 05 from Hyderabad and 11 from Visakhapatnam), while investigation and questioning on role of other workers at these illegal call centres is ongoing.
๐พ6๐2๐พ2
๐ฅ Zimbra SMTP - Remote Command Execution CVE-2024-45519 Exploit๐ฅ
Please open Telegram to view this post
VIEW IN TELEGRAM
๐2๐ฅ2