2FA Verification Code Bypass Attack via Burpsuite | OTP Verification Bypass | Bug Bounty
https://youtu.be/OjWhPenOkyA
https://youtu.be/OjWhPenOkyA
๐4
Forwarded from CYBER TRICKS ZONE ๐ฎ๐ณ๐ฉ (๐๐ซ๐จ๐ญ๐จ๐๐จ๐ฅ ๐๐ข๐๐ค)
Interactive-Cyber-Security-Career-Roadmap.pdf
742.8 KB
[#CYBER_TRICKS_ZONE]
CREDITS :- CYBRARY.IT
SUPPORT TO CYBER TRICKS ZONE โค๏ธ
@cybertrickszone1
INTERACTIVE CYBER SECURITY CAREER ROADMAP CREDITS :- CYBRARY.IT
SUPPORT TO CYBER TRICKS ZONE โค๏ธ
@cybertrickszone1
https://github.com/aydinnyunus/Keylogger
Get Keyboard,Mouse,ScreenShot,Microphone Inputs and Send to your Mail. Purpose of the project is testing the security of information systems
Get Keyboard,Mouse,ScreenShot,Microphone Inputs and Send to your Mail. Purpose of the project is testing the security of information systems
๐1
LFI Log Poisoning Attack (Reverse Shell, Privsec) | Bug Bounty
https://youtu.be/MDJZ7yeBARU
https://youtu.be/MDJZ7yeBARU
Forwarded from Bhartiya Hunters๐ฎ๐ณ (Founder & CEO โข)
Researchers uncover a set of 56 vulnerabilities affecting devices from 10 operational technology vendors (OT) โ widely used in industries such as oil and gas, chemical, nuclear, power generation and distribution and building automation.
Read: https://thehackernews.com/2022/06/researchers-disclose-56-vulnerabilities.html Shared by Indian hunters
Read: https://thehackernews.com/2022/06/researchers-disclose-56-vulnerabilities.html Shared by Indian hunters
๐6
Forwarded from Bhartiya Hunters๐ฎ๐ณ (Founder & CEO โข)
๐3
Forwarded from ๐๐ซ๐จ๐ญ๐จ๐๐จ๐ฅ ๐๐ข๐๐ค
YouTube
How to Watch YouTube Videos Completely Ads free? | 2 amazing Android apps | vanced alternative 2022
in this video i m going to show you how to watch ads free YouTube video in android apps , watch the video till the end
if you have any doubt queries then comment below.
Newpipe Apk download Link :- https://newpipe.net/#download
YouTube Revanced Downloadโฆ
if you have any doubt queries then comment below.
Newpipe Apk download Link :- https://newpipe.net/#download
YouTube Revanced Downloadโฆ
Forwarded from Bhartiya Hunters๐ฎ๐ณ (Founder & CEO โข)
Finding client-side prototype pollution with DOM Invader - Valueable Blog - Help in Cross Site Scripting in a Very Effective way!
https://portswigger.net/blog/finding-client-side-prototype-pollution-with-dom-invader
Shared by @Indianshunters
https://portswigger.net/blog/finding-client-side-prototype-pollution-with-dom-invader
Shared by @Indianshunters
PortSwigger Blog
Finding client-side prototype pollution with DOM Invader
Last year we made it significantly easier to find DOM XSS, when we introduced a brand new tool called DOM Invader. This year, we've improved DOM Invader to make finding CSPP (client-side prototype pol
๐3
Forwarded from Bhartiya Hunters๐ฎ๐ณ (Founder & CEO โข)
RIG Exploit Kit replaces the Raccoon stealer trojan with Dridex financial malware after one of its developers was killed in the Russian-Ukrainian war.
Read details: https://thehackernews.com/2022/06/rig-exploit-kit-now-infects-victims-pcs.html
Shared by @Indianshunters
Read details: https://thehackernews.com/2022/06/rig-exploit-kit-now-infects-victims-pcs.html
Shared by @Indianshunters
๐2
Forwarded from CYBER TRICKS ZONE ๐ฎ๐ณ๐ฉ (๐๐ซ๐จ๐ญ๐จ๐๐จ๐ฅ ๐๐ข๐๐ค)
[#CYBER_TRICKS_ZONE]
Best Top 18 Website to test Your Ethical Hacking Skills!
Link :- https://www.hackersblog.tech/2022/06/best-top-18-website-to-test-your.html
Credits:- @protocolnick
SUPPORT TO CYBER TRICKS ZONE โค๏ธ
@cybertrickszone1
Best Top 18 Website to test Your Ethical Hacking Skills!
Link :- https://www.hackersblog.tech/2022/06/best-top-18-website-to-test-your.html
Credits:- @protocolnick
SUPPORT TO CYBER TRICKS ZONE โค๏ธ
@cybertrickszone1
Admin Authentication Bypass Lead to Admin Account Takeover | UPS[.]com
https://youtu.be/H0TkDabDxWc
https://youtu.be/H0TkDabDxWc
๐2
Forwarded from Bhartiya Hunters๐ฎ๐ณ (Founder & CEO โข)
Why Coders Use AWS Server!๐ค Complete Accurate Explanation
- One of My Favourite Creators Discussing about it๐คฉ -
https://youtu.be/BSGcQi2WNPg
Shared by @Indianshunters
- One of My Favourite Creators Discussing about it๐คฉ -
https://youtu.be/BSGcQi2WNPg
Shared by @Indianshunters
YouTube
What is Amazon Web Services? AWS Explained | Tutorial & Resources
Link to resources:
1. Start with AWS : https://go.aws/3n0mRMU
2. Set up account & environment : https://go.aws/3b9RGfc
3. AWS Management Console : https://go.aws/3b9Rmx0
4. Install and learn the AWS Cloud Development Kit (CDK) : https://go.aws/3Op2nch
Amazonโฆ
1. Start with AWS : https://go.aws/3n0mRMU
2. Set up account & environment : https://go.aws/3b9RGfc
3. AWS Management Console : https://go.aws/3b9Rmx0
4. Install and learn the AWS Cloud Development Kit (CDK) : https://go.aws/3Op2nch
Amazonโฆ
๐6
Forwarded from Bhartiya Hunters๐ฎ๐ณ (Founder & CEO โข)
Researchers demonstrate 5 cryptographic attacks to break the encryption of the cloud storage service "MEGA," allowing compromise of user confidentiality.
https://thehackernews.com/2022/06/researchers-uncover-ways-to-break.html
โRSA Key Recovery
โPlaintext Recovery
โFraming Attack
โIntegrity Attack
โGaP-Bleichenbacher Attack
Shared by @Indianshunters
https://thehackernews.com/2022/06/researchers-uncover-ways-to-break.html
โRSA Key Recovery
โPlaintext Recovery
โFraming Attack
โIntegrity Attack
โGaP-Bleichenbacher Attack
Shared by @Indianshunters
๐2
Forwarded from Bhartiya Hunters๐ฎ๐ณ (Founder & CEO โข)
MetaMask Clickjacking Vulnerability Analysis
https://slowmist.medium.com/metamask-clickjacking-vulnerability-analysis-f3e7c22ff4d9
Shared by @Indianshunters
https://slowmist.medium.com/metamask-clickjacking-vulnerability-analysis-f3e7c22ff4d9
Shared by @Indianshunters
Medium
MetaMask Clickjacking Vulnerability Analysis
Weโre releasing our findings on this Clickjacking vulnerability to help other projects avoid making the same issue.