๐KAK ROSE BULI SAYA BALIK GENG ๐คฃ๐ญ๐ญ HABIS LAH HELANG KENA PANGGANG๐ญ DAH TAK SELAMAT๐ญ
๐คฃ1
Forwarded from ๐ถ๐๐๐ ๐บ๐ ๐ฟ๐๐ ๐ฏ๐๐๐๐๐๐๐
ุณูููููููููููููููููููู
ู ุงูููู ุงูุฑููุญูู
ููู ุงูุฑููุญูููู
ู
ุงููู ุฃูุจุฑ ุงููู ุฃูุจุฑ ุงููู ุฃูุจุฑ
ุฅู ุดุงุก ุงููู
We are legionโwe do not forgiveโwe do not forgetโexpect usโ
We are not PHISANGGGGGโ๏ธ
We are not PALABANAโ๏ธ
We are not PALATAUโ๏ธ
๐๐คฃ๐๐คฃ๐๐คฃ๐๐คฃ
Target : https://ots.org.il
No WAF detected by the generic detection
IP : 35.208.92.126
Hostname: 126.92.208.35.bc.googleusercontent.com
ISP : Google LLC
Port : 53 filtered domain
Port : 80 http open
Port : 443 https open
Method : TCP UDP
Proxy Method : socks5.txt
ุงููู ุฃูุจุฑ ุงููู ุฃูุจุฑ ุงููู ุฃูุจุฑ
ุฅู ุดุงุก ุงููู
We are legionโwe do not forgiveโwe do not forgetโexpect usโ
We are not PHISANGGGGGโ๏ธ
We are not PALABANAโ๏ธ
We are not PALATAUโ๏ธ
๐๐คฃ๐๐คฃ๐๐คฃ๐๐คฃ
Target : https://ots.org.il
No WAF detected by the generic detection
IP : 35.208.92.126
Hostname: 126.92.208.35.bc.googleusercontent.com
ISP : Google LLC
Port : 53 filtered domain
Port : 80 http open
Port : 443 https open
Method : TCP UDP
Proxy Method : socks5.txt
๐2๐ฅ1
Forwarded from LulzSec Muslims ๏ธ
Media is too big
VIEW IN TELEGRAM
Welcome, how are you?
๐It's time to stand up
Back from deep slumber
Get ready Heroes!
๐ญDays and we start !!!
#LulzSec_Muslims
#Lulz_Sec
๐It's time to stand up
Back from deep slumber
Get ready Heroes!
๐ญDays and we start !!!
#LulzSec_Muslims
#Lulz_Sec
๐ Wireless Technologies
In order to be able to hack wireless, you must first understand how it works. Things like the encryption algorithms (WEP, WPA, WPA2), the four-way handshake, and WPS. In addition, understanding such as things as the protocol for connection and authentication and the legal constraints on wireless technologies.
To get started, check out my guide below on getting started with wireless terms and technologies, then read our collection of Wi-Fi hacking guides for further information on each kind of encryption algorithms and for examples of how each hack works.
Getting Started with Wi-Fi Terms & Technologies
The Intermediate Skills
This is where things get interesting, and where you really start to get a feel for your capabilities as a hacker. Knowing all of these will allow you to advance to more intuitive hacks where you are calling all the shotsโnot some other hacker.๐ฅ1
List of notes in Nethunter:
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
You can retrieve these notes by using
-
android12-
androidap-
beef-xss-
bluetooth-adapters-
broadcom-
documentation-
fix-channel-
fix-internet-
fix_modules_issue-
fix-symlink-
fluxion-
form-
hid-
hid-keyboard-
hid_mtk-
hijacker-arm64-yesimxev-
hijacker-latest-
installing-rootless-
install_nethunter-
iptables-
kali-cookbook-
kexfix-
libcfix-
magisk-
nethunter-pentesting-
nethunter-testers-
nh_audio-
nhstore-
op7_custom-
op7_oos-
pam-fix-
postgresql-fix-
prima-mon-
pyrit-
termux-bootkali-
types_of_nethunter-
wificards-
wifite2-
wireless_firmware-
wireshark-fix
You can retrieve these notes by using
/get notename, or #notename๐ฅ Topaz Photo AI 2.1.4
Topaz Photo AI is an advanced photo enhancement software that utilizes the power of artificial intelligence and machine learning algorithms to transform ordinary photos into extraordinary works of art
Key Features and Benefits
Technical Details and System Requirements
- Windows 10/11 64-bit
- 4 GB of RAM
- 2 GHz processor
- 4 GB of available hard drive space
Password:
๐ฅ https://devuploads.com/bmurk817h8ww
Topaz Photo AI is an advanced photo enhancement software that utilizes the power of artificial intelligence and machine learning algorithms to transform ordinary photos into extraordinary works of art
Key Features and Benefits
โขIntelligent Noise Reduction
โขAdvanced Image Upscaling
โขAI-based Enhancements
โขEasy-to-Use Interface
โขIntegration and CompatibilityTechnical Details and System Requirements
- Windows 10/11 64-bit
- 4 GB of RAM
- 2 GHz processor
- 4 GB of available hard drive space
Password:
@Pc_1ly๐ฅ https://devuploads.com/bmurk817h8ww
๐ฅ1
Forwarded from ุงููุงุณูุญ
Allah is great and glory to Allah
Your soldiers and brothers, members of the Rapid Response Battalion, are engaged in very violent clashes with live bullets and explosive devices in several different areas in the Martyrs Camp, Tulkarm Camp.
May you always be a shield for us, and we be a drawn sword for you, inchaAllah
Your soldiers and brothers, members of the Rapid Response Battalion, are engaged in very violent clashes with live bullets and explosive devices in several different areas in the Martyrs Camp, Tulkarm Camp.
May you always be a shield for us, and we be a drawn sword for you, inchaAllah
๐ฅ2
Forwarded from ูุชูุจุฉ ุทูููุฑู
(ุงูุฑุฏ ุงูุณุฑูุน)
ุงููู ุฃูุจุฑ ูุงูุนุฒุฉ ููู
ุฌููุฏูู ูุงุฎูุงููู ุฃุจูุงุก ูุชูุจุฉ ุงูุฑุฏ ุงูุณุฑูุน ูุฎูุถูู ุงุดุชุจุงูุงุช ุนูููุฉ ุฌุฏุงู ุจุงูุฑุตุงุต ุงูุญู ูุงูุนุจูุงุช ุงูู ุชูุฌุฑุฉ ูู ุนุฏุฉ ู ุญุงูุฑ ู ุฎุชููุฉ ูู ู ุฎูู ุงูุดูุฏุงุก ู ุฎูู ุทูููุฑู .
ุฏู ุชู ููุง ุฏุฑุนุงู ูุฏู ูุง ููู ุณููุงู ู ุณูููุงู ุจุฃุฐู ุงููู
ุฌููุฏูู ูุงุฎูุงููู ุฃุจูุงุก ูุชูุจุฉ ุงูุฑุฏ ุงูุณุฑูุน ูุฎูุถูู ุงุดุชุจุงูุงุช ุนูููุฉ ุฌุฏุงู ุจุงูุฑุตุงุต ุงูุญู ูุงูุนุจูุงุช ุงูู ุชูุฌุฑุฉ ูู ุนุฏุฉ ู ุญุงูุฑ ู ุฎุชููุฉ ูู ู ุฎูู ุงูุดูุฏุงุก ู ุฎูู ุทูููุฑู .
ุฏู ุชู ููุง ุฏุฑุนุงู ูุฏู ูุง ููู ุณููุงู ู ุณูููุงู ุจุฃุฐู ุงููู
Forwarded from แดแดษดษขแดแดสแดแดแดสสแดสแดสแดแดก Official
๐จ Beware of YouTube videos offering cracked software! They might lead you to download Lumma malware, stealing your sensitive information.
Learn more: https://thehackernews.com/2024/01/beware-youtube-videos-promoting-cracked.html
Learn more: https://thehackernews.com/2024/01/beware-youtube-videos-promoting-cracked.html
Forwarded from ๐ถ๐๐๐ ๐บ๐ ๐ฟ๐๐ ๐ฏ๐๐๐๐๐๐๐
ุณูููููููููููููููููููู
ู ุงูููู ุงูุฑููุญูู
ููู ุงูุฑููุญูููู
ู
ุงููู ุฃูุจุฑ ุงููู ุฃูุจุฑ ุงููู ุฃูุจุฑ
ุฅู ุดุงุก ุงููู
We are legionโwe do not forgiveโwe do not forgetโexpect usโ
We are not PHISANGGGGGโ๏ธ
We are not PALABANAโ๏ธ
We are not PALATAUโ๏ธ
๐๐คฃ๐๐คฃ๐๐คฃ๐๐คฃ
MASA DDOS : 0๏ธโฃ9๏ธโฃ : 0๏ธโฃ0๏ธโฃ pm
TARIKH : 09.DISEMBER.2023
Target https://newcomersguide.co.il
IP : 35.212.51.59
Hostname : 59.51.212.35.bc.googleusercontent.com
ISP : Google LLC
Info : No waf
Port : 53 filtered domain
Port : 80 open http
Port : 443 open https
Method : TCP UDP
Proxy Method : socks5.txt
ุงููู ุฃูุจุฑ ุงููู ุฃูุจุฑ ุงููู ุฃูุจุฑ
ุฅู ุดุงุก ุงููู
We are legionโwe do not forgiveโwe do not forgetโexpect usโ
We are not PHISANGGGGGโ๏ธ
We are not PALABANAโ๏ธ
We are not PALATAUโ๏ธ
๐๐คฃ๐๐คฃ๐๐คฃ๐๐คฃ
MASA DDOS : 0๏ธโฃ9๏ธโฃ : 0๏ธโฃ0๏ธโฃ pm
TARIKH : 09.DISEMBER.2023
Target https://newcomersguide.co.il
IP : 35.212.51.59
Hostname : 59.51.212.35.bc.googleusercontent.com
ISP : Google LLC
Info : No waf
Port : 53 filtered domain
Port : 80 open http
Port : 443 open https
Method : TCP UDP
Proxy Method : socks5.txt
๐ฅ5
Forwarded from ๐ถ๐๐๐ ๐บ๐ ๐ฟ๐๐ ๐ฏ๐๐๐๐๐๐๐
ุณูููููููููููููููููููู
ู ุงูููู ุงูุฑููุญูู
ููู ุงูุฑููุญูููู
ู
ุงููู ุฃูุจุฑ ุงููู ุฃูุจุฑ ุงููู ุฃูุจุฑ
ุฅู ุดุงุก ุงููู
We are legionโwe do not forgiveโwe do not forgetโexpect usโ
We are not PHISANGGGGGโ๏ธ
We are not PALABANAโ๏ธ
We are not PALATAUโ๏ธ
๐๐คฃ๐๐คฃ๐๐คฃ๐๐คฃ
MASA DDOS : 1๏ธโฃ0๏ธโฃ : 0๏ธโฃ0๏ธโฃ pm
TARIKH : 09.DISEMBER.2023
Target : https://ita.org.il
IP : 164.92.233.213
Hostname : ita.org.il
ISP : DigitalOcean, LLC
Info : No Waf
Port : 53 filtered domain
Port : open http
Port : open https
Method : GET HEAD POST
ุงููู ุฃูุจุฑ ุงููู ุฃูุจุฑ ุงููู ุฃูุจุฑ
ุฅู ุดุงุก ุงููู
We are legionโwe do not forgiveโwe do not forgetโexpect usโ
We are not PHISANGGGGGโ๏ธ
We are not PALABANAโ๏ธ
We are not PALATAUโ๏ธ
๐๐คฃ๐๐คฃ๐๐คฃ๐๐คฃ
MASA DDOS : 1๏ธโฃ0๏ธโฃ : 0๏ธโฃ0๏ธโฃ pm
TARIKH : 09.DISEMBER.2023
Target : https://ita.org.il
IP : 164.92.233.213
Hostname : ita.org.il
ISP : DigitalOcean, LLC
Info : No Waf
Port : 53 filtered domain
Port : open http
Port : open https
Method : GET HEAD POST
๐ฅ3๐1
Forwarded from แดแดษดษขแดแดสแดแดแดสสแดสแดสแดแดก Official
โ ๏ธ Attention Kyocera & QNAP users:
Kyocera addresses dangerous CVE-2023-50916 flaw, preventing unauthorized access. QNAP tackles CVE-2023-39296, safeguarding against crashes.
Read details here: https://thehackernews.com/2024/01/alert-new-vulnerabilities-discovered-in.html
Kyocera addresses dangerous CVE-2023-50916 flaw, preventing unauthorized access. QNAP tackles CVE-2023-39296, safeguarding against crashes.
Read details here: https://thehackernews.com/2024/01/alert-new-vulnerabilities-discovered-in.html
TERKINI* ISU INI TELAH DISELESAIKAN. Sistem adalah selamat sekarang.
- Kelemahan dalam pengendalian authentication ini tidak ditemui semasa Security Posture Assessment (SPA).
- Pasukan telah mengambil tindakan segera serta penyelesaian telah dilaksanakan dalam tempoh 1 jam dan telah selesai pada 2 Januari 2024 jam 9.15 malam.
***
Macam tu lah dia punya security. Adoila.
Tak tegur nanti orang kata walanon.
Tegur nanti orang kata walaun.
Kelemahan pada API (Application Programming Interface) sistem PADU membolehkan pihak tidak bertanggungjawab mengubah maklumat login (password) kita dengan hanya menggunakan maklumat nombor kad pengenalan.
Mana nak dapat nombor kad pengenalan? Banyak dah bocor. Tak perlu cari dekat dark web, Internet forum biasa pun berlambak dah.
Rafizi Ramli
Fahmi Fadzil
Dr. Ong Kian Ming - ็ๅปบๆฐ
https://m.facebook.com/story.php?story_fbid=pfbid0DXrra3e1r7cckhkdVVQYAxVoo2eddF5uLWD9gcaWtQUVCuhmwydsZizaHjZ8oSxHl&id=100063807923072&mibextid=NOb6eG
- Kelemahan dalam pengendalian authentication ini tidak ditemui semasa Security Posture Assessment (SPA).
- Pasukan telah mengambil tindakan segera serta penyelesaian telah dilaksanakan dalam tempoh 1 jam dan telah selesai pada 2 Januari 2024 jam 9.15 malam.
***
Macam tu lah dia punya security. Adoila.
Tak tegur nanti orang kata walanon.
Tegur nanti orang kata walaun.
Kelemahan pada API (Application Programming Interface) sistem PADU membolehkan pihak tidak bertanggungjawab mengubah maklumat login (password) kita dengan hanya menggunakan maklumat nombor kad pengenalan.
Mana nak dapat nombor kad pengenalan? Banyak dah bocor. Tak perlu cari dekat dark web, Internet forum biasa pun berlambak dah.
Rafizi Ramli
Fahmi Fadzil
Dr. Ong Kian Ming - ็ๅปบๆฐ
https://m.facebook.com/story.php?story_fbid=pfbid0DXrra3e1r7cckhkdVVQYAxVoo2eddF5uLWD9gcaWtQUVCuhmwydsZizaHjZ8oSxHl&id=100063807923072&mibextid=NOb6eG
๐2
Forwarded from ๐ถ๐๐๐ ๐บ๐ ๐ฟ๐๐ ๐ฏ๐๐๐๐๐๐๐
ุณูููููููููููููููููููู
ู ุงูููู ุงูุฑููุญูู
ููู ุงูุฑููุญูููู
ู
ุงููู ุฃูุจุฑ ุงููู ุฃูุจุฑ ุงููู ุฃูุจุฑ
ุฅู ุดุงุก ุงููู
We are legionโwe do not forgiveโwe do not forgetโexpect usโ
We are not PHISANGGGGGโ๏ธ
We are not PALABANAโ๏ธ
We are not PALATAUโ๏ธ
๐๐คฃ๐๐คฃ๐๐คฃ๐๐คฃ
MASA DDOS : 1๏ธโฃ1๏ธโฃ : 0๏ธโฃ0๏ธโฃ pm
TARIKH : 09.DISEMBER.2023
Target : https://www.natal.org.il
No WAF detected by the generic detection
IP : 185.106.128.156
Hostname : 185.106.128.156
ISP : O.M.C. COMPUTERS & COMMUNICATIONS LTD
Port : 53 open domain
Port : open 80 http
Port : open 443 https
Port : 8443 http-alt
Method : GET HEAD POST
Method Proxy : http-proxy/socks5.txt
ุงููู ุฃูุจุฑ ุงููู ุฃูุจุฑ ุงููู ุฃูุจุฑ
ุฅู ุดุงุก ุงููู
We are legionโwe do not forgiveโwe do not forgetโexpect usโ
We are not PHISANGGGGGโ๏ธ
We are not PALABANAโ๏ธ
We are not PALATAUโ๏ธ
๐๐คฃ๐๐คฃ๐๐คฃ๐๐คฃ
MASA DDOS : 1๏ธโฃ1๏ธโฃ : 0๏ธโฃ0๏ธโฃ pm
TARIKH : 09.DISEMBER.2023
Target : https://www.natal.org.il
No WAF detected by the generic detection
IP : 185.106.128.156
Hostname : 185.106.128.156
ISP : O.M.C. COMPUTERS & COMMUNICATIONS LTD
Port : 53 open domain
Port : open 80 http
Port : open 443 https
Port : 8443 http-alt
Method : GET HEAD POST
Method Proxy : http-proxy/socks5.txt
๐ฅ1
Exploit for Out-of-bounds Write in Polkit Project Polkit exploit
https://sploitus.com/exploit?id=7F53E177-1517-5E69-84F1-CC304A3F87F3
Intrasrv Simple Web Server 1.0 Denial Of Service Exploit exploit
https://sploitus.com/exploit?id=1337DAY-ID-39231
liveSite 2019.1 Remote Code Execution Vulnerability exploit
https://sploitus.com/exploit?id=1337DAY-ID-39234
AdvantechWeb / SCADA 9.1.5U SQL Injection Vulnerability exploit
https://sploitus.com/exploit?id=1337DAY-ID-39233
Microsoft SQL Server db_ddladmin Privilege Escalation Vulnerability exploit
https://sploitus.com/exploit?id=1337DAY-ID-39232
cpio 2.13 Privilege Escalation Vulnerability exploit
https://sploitus.com/exploit?id=1337DAY-ID-39235
Exploit for Missing Authentication for Critical Function in F5 Big-Ip Access Policy Manager exploit
https://sploitus.com/exploit?id=A6CCA51E-2A51-52B2-A2E6-4518F7790F37
https://sploitus.com/exploit?id=7F53E177-1517-5E69-84F1-CC304A3F87F3
Intrasrv Simple Web Server 1.0 Denial Of Service Exploit exploit
https://sploitus.com/exploit?id=1337DAY-ID-39231
liveSite 2019.1 Remote Code Execution Vulnerability exploit
https://sploitus.com/exploit?id=1337DAY-ID-39234
AdvantechWeb / SCADA 9.1.5U SQL Injection Vulnerability exploit
https://sploitus.com/exploit?id=1337DAY-ID-39233
Microsoft SQL Server db_ddladmin Privilege Escalation Vulnerability exploit
https://sploitus.com/exploit?id=1337DAY-ID-39232
cpio 2.13 Privilege Escalation Vulnerability exploit
https://sploitus.com/exploit?id=1337DAY-ID-39235
Exploit for Missing Authentication for Critical Function in F5 Big-Ip Access Policy Manager exploit
https://sploitus.com/exploit?id=A6CCA51E-2A51-52B2-A2E6-4518F7790F37
Sploitus
๐ Exploit for Out-of-bounds Read in Polkit Project Polkit CVE-2021-4034
Exploit for Out-of-bounds Read in Polkit Project Polkit CVE-2021-4034 | Sploitus | Exploit & Hacktool Search Engine
๐ฅ2
ADA KA OQANG SIK KEDAH KA DALAM NI? ๐BEST NI ADA WAYANG KULIT/CERAMAH DAN SEBAGAINYA๐๐ฅฐ, JEMPUT HADIR NANTI, HARAP SAYA PUN XKENA SCAM JUGAK LA NANTI๐คฃ๐ฅฐ