25 subscribers
265 photos
26 videos
64 files
279 links
Download Telegram
๐Ÿ˜‚KAK ROSE BULI SAYA BALIK GENG ๐Ÿคฃ๐Ÿ˜ญ๐Ÿ˜ญ HABIS LAH HELANG KENA PANGGANG๐Ÿ˜ญ DAH TAK SELAMAT๐Ÿ˜ญ
๐Ÿคฃ1
Forwarded from ๐•ถ๐–Ž๐–“๐–Œ ๐•บ๐–‹ ๐•ฟ๐–๐–Š ๐•ฏ๐–†๐–—๐–๐–“๐–Š๐–˜๐–˜
ุณู’ู€ู€ู€ู€ู€ู€ู€ู€ู€ู€ู€ู€ู€ู€ู€ู€ู€ู€ู…ู ุงู„ู„ู‡ู ุงู„ุฑูŽู‘ุญู’ู…ูŽู†ู ุงู„ุฑูŽู‘ุญููŠู’ู…ู

ุงู„ู„ู‡ ุฃูƒุจุฑ    ุงู„ู„ู‡ ุฃูƒุจุฑ    ุงู„ู„ู‡ ุฃูƒุจุฑ

ุฅู† ุดุงุก ุงู„ู„ู‡

We are legionโ—we do not forgiveโ—we do not forgetโ—expect usโ—
We are not PHISANGGGGGโ—๏ธ
We are not PALABANAโ—๏ธ
We are not PALATAUโ—๏ธ
๐Ÿ˜‚๐Ÿคฃ๐Ÿ˜‚๐Ÿคฃ๐Ÿ˜‚๐Ÿคฃ๐Ÿ˜‚๐Ÿคฃ

Target : https://ots.org.il
No WAF detected by the generic detection
IP : 35.208.92.126
Hostname:  126.92.208.35.bc.googleusercontent.com
ISP : Google LLC

Port : 53 filtered domain
Port : 80 http open
Port : 443 https open
Method : TCP UDP
Proxy Method : socks5.txt
๐Ÿ‘2๐Ÿ”ฅ1
Forwarded from LulzSec Muslims ๏ธ
Media is too big
VIEW IN TELEGRAM
Welcome, how are you?

๐Ÿ“It's time to stand up
Back from deep slumber
Get ready Heroes!

๐ŸŽญDays and we start !!!



#LulzSec_Muslims
#Lulz_Sec
๐ŸŒ€ Wireless Technologies

In order to be able to hack wireless, you must first understand how it works. Things like the encryption algorithms (WEP, WPA, WPA2), the four-way handshake, and WPS. In addition, understanding such as things as the protocol for connection and authentication and the legal constraints on wireless technologies.
To get started, check out my guide below on getting started with wireless terms and technologies, then read our collection of Wi-Fi hacking guides for further information on each kind of encryption algorithms and for examples of how each hack works.

Getting Started with Wi-Fi Terms & Technologies
The Intermediate Skills
This is where things get interesting, and where you really start to get a feel for your capabilities as a hacker. Knowing all of these will allow you to advance to more intuitive hacks where you are calling all the shotsโ€”not some other hacker.
๐Ÿ”ฅ1
List of notes in Nethunter:

- android12
- androidap
- beef-xss
- bluetooth-adapters
- broadcom
- documentation
- fix-channel
- fix-internet
- fix_modules_issue
- fix-symlink
- fluxion
- form
- hid
- hid-keyboard
- hid_mtk
- hijacker-arm64-yesimxev
- hijacker-latest
- installing-rootless
- install_nethunter
- iptables
- kali-cookbook
- kexfix
- libcfix
- magisk
- nethunter-pentesting
- nethunter-testers
- nh_audio
- nhstore
- op7_custom
- op7_oos
- pam-fix
- postgresql-fix
- prima-mon
- pyrit
- termux-bootkali
- types_of_nethunter
- wificards
- wifite2
- wireless_firmware
- wireshark-fix

You can retrieve these notes by using /get notename, or #notename
๐Ÿ–ฅ Topaz Photo AI 2.1.4

Topaz Photo AI is an advanced photo enhancement software that utilizes the power of artificial intelligence and machine learning algorithms to transform ordinary photos into extraordinary works of art
Key Features and Benefits
โžขIntelligent Noise Reduction
โžขAdvanced Image Upscaling
โžขAI-based Enhancements
โžขEasy-to-Use Interface
โžขIntegration and Compatibility


Technical Details and System Requirements
- Windows 10/11 64-bit
- 4 GB of RAM
- 2 GHz processor
- 4 GB of available hard drive space

Password: @Pc_1ly

๐Ÿ“ฅ https://devuploads.com/bmurk817h8ww
๐Ÿ”ฅ1
Allah is great and glory to Allah

Your soldiers and brothers, members of the Rapid Response Battalion, are engaged in very violent clashes with live bullets and explosive devices in several different areas in the Martyrs Camp, Tulkarm Camp.

May you always be a shield for us, and we be a drawn sword for you, inchaAllah
๐Ÿ”ฅ2
ุงู„ู„ู‡ ุฃูƒุจุฑ ูˆุงู„ุนุฒุฉ ู„ู„ู‡

ุฌู†ูˆุฏูƒู… ูˆุงุฎูˆุงู†ูƒู… ุฃุจู†ุงุก ูƒุชูŠุจุฉ ุงู„ุฑุฏ ุงู„ุณุฑูŠุน ูŠุฎูˆุถูˆู† ุงุดุชุจุงูƒุงุช ุนู†ูŠูุฉ ุฌุฏุงู‹ ุจุงู„ุฑุตุงุต ุงู„ุญูŠ ูˆุงู„ุนุจูˆุงุช ุงู„ู…ุชูุฌุฑุฉ ููŠ ุนุฏุฉ ู…ุญุงูˆุฑ ู…ุฎุชู„ูุฉ ููŠ ู…ุฎูŠู… ุงู„ุดู‡ุฏุงุก ู…ุฎูŠู… ุทูˆู„ูƒุฑู… .

ุฏู…ุชู… ู„ู†ุง ุฏุฑุนุงู‹ ูˆุฏู…ู†ุง ู„ูƒู… ุณูŠูุงู‹ ู…ุณู„ูˆู„ุงู‹ ุจุฃุฐู† ุงู„ู„ู‡
Forwarded from แด›แด‡ษดษขแด‹แดส€แด€แด‹แด„สส™แด‡ส€แด„ส€แด‡แดก Official
๐Ÿšจ Beware of YouTube videos offering cracked software! They might lead you to download Lumma malware, stealing your sensitive information.

Learn more: https://thehackernews.com/2024/01/beware-youtube-videos-promoting-cracked.html
Forwarded from ๐•ถ๐–Ž๐–“๐–Œ ๐•บ๐–‹ ๐•ฟ๐–๐–Š ๐•ฏ๐–†๐–—๐–๐–“๐–Š๐–˜๐–˜
ุณู’ู€ู€ู€ู€ู€ู€ู€ู€ู€ู€ู€ู€ู€ู€ู€ู€ู€ู€ู…ู ุงู„ู„ู‡ู ุงู„ุฑูŽู‘ุญู’ู…ูŽู†ู ุงู„ุฑูŽู‘ุญููŠู’ู…ู

ุงู„ู„ู‡ ุฃูƒุจุฑ    ุงู„ู„ู‡ ุฃูƒุจุฑ    ุงู„ู„ู‡ ุฃูƒุจุฑ

ุฅู† ุดุงุก ุงู„ู„ู‡

We are legionโ—we do not forgiveโ—we do not forgetโ—expect usโ—
We are not PHISANGGGGGโ—๏ธ
We are not PALABANAโ—๏ธ
We are not PALATAUโ—๏ธ
๐Ÿ˜‚๐Ÿคฃ๐Ÿ˜‚๐Ÿคฃ๐Ÿ˜‚๐Ÿคฃ๐Ÿ˜‚๐Ÿคฃ

MASA DDOS : 0๏ธโƒฃ9๏ธโƒฃ : 0๏ธโƒฃ0๏ธโƒฃ pm
TARIKH : 09.DISEMBER.2023

Target https://newcomersguide.co.il
IP : 35.212.51.59
Hostname : 59.51.212.35.bc.googleusercontent.com
ISP : Google LLC
Info : No waf

Port : 53 filtered domain
Port : 80 open http
Port : 443 open https
Method : TCP UDP
Proxy Method : socks5.txt
๐Ÿ”ฅ5
Forwarded from ๐•ถ๐–Ž๐–“๐–Œ ๐•บ๐–‹ ๐•ฟ๐–๐–Š ๐•ฏ๐–†๐–—๐–๐–“๐–Š๐–˜๐–˜
ุณู’ู€ู€ู€ู€ู€ู€ู€ู€ู€ู€ู€ู€ู€ู€ู€ู€ู€ู€ู…ู ุงู„ู„ู‡ู ุงู„ุฑูŽู‘ุญู’ู…ูŽู†ู ุงู„ุฑูŽู‘ุญููŠู’ู…ู

ุงู„ู„ู‡ ุฃูƒุจุฑ    ุงู„ู„ู‡ ุฃูƒุจุฑ    ุงู„ู„ู‡ ุฃูƒุจุฑ

ุฅู† ุดุงุก ุงู„ู„ู‡

We are legionโ—we do not forgiveโ—we do not forgetโ—expect usโ—
We are not PHISANGGGGGโ—๏ธ
We are not PALABANAโ—๏ธ
We are not PALATAUโ—๏ธ
๐Ÿ˜‚๐Ÿคฃ๐Ÿ˜‚๐Ÿคฃ๐Ÿ˜‚๐Ÿคฃ๐Ÿ˜‚๐Ÿคฃ

MASA DDOS : 1๏ธโƒฃ0๏ธโƒฃ : 0๏ธโƒฃ0๏ธโƒฃ pm
TARIKH : 09.DISEMBER.2023

Target : https://ita.org.il
IP : 164.92.233.213
Hostname : ita.org.il
ISP : DigitalOcean, LLC
Info : No Waf

Port : 53 filtered domain
Port : open http
Port : open https
Method : GET HEAD POST
๐Ÿ”ฅ3๐Ÿ‘1
Forwarded from แด›แด‡ษดษขแด‹แดส€แด€แด‹แด„สส™แด‡ส€แด„ส€แด‡แดก Official
โš ๏ธ Attention Kyocera & QNAP users:

Kyocera addresses dangerous CVE-2023-50916 flaw, preventing unauthorized access. QNAP tackles CVE-2023-39296, safeguarding against crashes.

Read details here: https://thehackernews.com/2024/01/alert-new-vulnerabilities-discovered-in.html
TERKINI* ISU INI TELAH DISELESAIKAN. Sistem adalah selamat sekarang.
- Kelemahan dalam pengendalian authentication ini tidak ditemui semasa Security Posture Assessment (SPA).
- Pasukan telah mengambil tindakan segera serta penyelesaian telah dilaksanakan dalam tempoh 1 jam dan telah selesai pada 2 Januari 2024 jam 9.15 malam.
***
Macam tu lah dia punya security. Adoila.
Tak tegur nanti orang kata walanon.
Tegur nanti orang kata walaun.

Kelemahan pada API (Application Programming Interface) sistem PADU membolehkan pihak tidak bertanggungjawab mengubah maklumat login (password) kita dengan hanya menggunakan maklumat nombor kad pengenalan.

Mana nak dapat nombor kad pengenalan? Banyak dah bocor. Tak perlu cari dekat dark web, Internet forum biasa pun berlambak dah.

Rafizi Ramli
Fahmi Fadzil
Dr. Ong Kian Ming - ็Ž‹ๅปบๆฐ‘

https://m.facebook.com/story.php?story_fbid=pfbid0DXrra3e1r7cckhkdVVQYAxVoo2eddF5uLWD9gcaWtQUVCuhmwydsZizaHjZ8oSxHl&id=100063807923072&mibextid=NOb6eG
๐Ÿ‘2
Forwarded from ๐•ถ๐–Ž๐–“๐–Œ ๐•บ๐–‹ ๐•ฟ๐–๐–Š ๐•ฏ๐–†๐–—๐–๐–“๐–Š๐–˜๐–˜
ุณู’ู€ู€ู€ู€ู€ู€ู€ู€ู€ู€ู€ู€ู€ู€ู€ู€ู€ู€ู…ู ุงู„ู„ู‡ู ุงู„ุฑูŽู‘ุญู’ู…ูŽู†ู ุงู„ุฑูŽู‘ุญููŠู’ู…ู

ุงู„ู„ู‡ ุฃูƒุจุฑ    ุงู„ู„ู‡ ุฃูƒุจุฑ    ุงู„ู„ู‡ ุฃูƒุจุฑ

ุฅู† ุดุงุก ุงู„ู„ู‡

We are legionโ—we do not forgiveโ—we do not forgetโ—expect usโ—
We are not PHISANGGGGGโ—๏ธ
We are not PALABANAโ—๏ธ
We are not PALATAUโ—๏ธ
๐Ÿ˜‚๐Ÿคฃ๐Ÿ˜‚๐Ÿคฃ๐Ÿ˜‚๐Ÿคฃ๐Ÿ˜‚๐Ÿคฃ

MASA DDOS : 1๏ธโƒฃ1๏ธโƒฃ : 0๏ธโƒฃ0๏ธโƒฃ pm
TARIKH : 09.DISEMBER.2023

Target : https://www.natal.org.il
No WAF detected by the generic detection
IP : 185.106.128.156
Hostname : 185.106.128.156
ISP : O.M.C. COMPUTERS & COMMUNICATIONS LTD
Port : 53 open domain
Port : open 80 http
Port : open 443 https
Port : 8443 http-alt
Method : GET HEAD POST
Method Proxy : http-proxy/socks5.txt
๐Ÿ”ฅ1
Exploit for Out-of-bounds Write in Polkit Project Polkit exploit
https://sploitus.com/exploit?id=7F53E177-1517-5E69-84F1-CC304A3F87F3

Intrasrv Simple Web Server 1.0 Denial Of Service Exploit exploit
https://sploitus.com/exploit?id=1337DAY-ID-39231

liveSite 2019.1 Remote Code Execution Vulnerability exploit
https://sploitus.com/exploit?id=1337DAY-ID-39234

AdvantechWeb / SCADA 9.1.5U SQL Injection Vulnerability exploit
https://sploitus.com/exploit?id=1337DAY-ID-39233

Microsoft SQL Server db_ddladmin Privilege Escalation Vulnerability exploit
https://sploitus.com/exploit?id=1337DAY-ID-39232

cpio 2.13 Privilege Escalation Vulnerability exploit
https://sploitus.com/exploit?id=1337DAY-ID-39235

Exploit for Missing Authentication for Critical Function in F5 Big-Ip Access Policy Manager exploit
https://sploitus.com/exploit?id=A6CCA51E-2A51-52B2-A2E6-4518F7790F37
๐Ÿ”ฅ2
ADA KA OQANG SIK KEDAH KA DALAM NI? ๐Ÿ˜ŠBEST NI ADA WAYANG KULIT/CERAMAH DAN SEBAGAINYA๐Ÿ˜Š๐Ÿฅฐ, JEMPUT HADIR NANTI, HARAP SAYA PUN XKENA SCAM JUGAK LA NANTI๐Ÿคฃ๐Ÿฅฐ