25 subscribers
265 photos
26 videos
64 files
279 links
Download Telegram
Forwarded from STUCX TEAM ๐Ÿ•ท
Please open Telegram to view this post
VIEW IN TELEGRAM
ASSALAMUALAIKUM GUYS
KEPADA ALL MUSLIMS HACKERS

ADA LAGI TEAM YANG MAU IKUT OPS SAUDI ARABIA?

BOLEH LETAK DIBAWAH YA
Forwarded from ๐•ถ๐–Ž๐–“๐–Œ ๐•บ๐–‹ ๐•ฟ๐–๐–Š ๐•ฏ๐–†๐–—๐–๐–“๐–Š๐–˜๐–˜
ุณู’ู€ู€ู€ู€ู€ู€ู€ู€ู€ู€ู€ู€ู€ู€ู€ู€ู€ู€ู…ู ุงู„ู„ู‡ู ุงู„ุฑูŽู‘ุญู’ู…ูŽู†ู ุงู„ุฑูŽู‘ุญููŠู’ู…ู

ุงู„ู„ู‡ ุฃูƒุจุฑ    ุงู„ู„ู‡ ุฃูƒุจุฑ    ุงู„ู„ู‡ ุฃูƒุจุฑ

ุฅู† ุดุงุก ุงู„ู„ู‡


We are not PHISANGGGGGโ—๏ธ
We are not PALABANAโ—๏ธ
We are not PALATAUโ—๏ธ

MASA DDOS : 0๏ธโƒฃ9๏ธโƒฃ : 0๏ธโƒฃ0๏ธโƒฃ pm
TARIKH : 18.JANUARI.2024

Target : https://aaci.org.il
IP : 88.218.116.56
Hostname : s-vps-il-418.upress.io
ISP : uPress Inc
Info : no waf

Port : 53 filetere domain
Port : 80 open http
Port : 443 open https
Method : TCP / UDP
Forwarded from แด›แด‡ษดษขแด‹แดส€แด€แด‹แด„สส™แด‡ส€แด„ส€แด‡แดก Official
โš ๏ธ Developers, beware! Hackers can poison AI models and software. Vulnerabilities found in TensorFlow CI/CD pipeline allow #malware upload and token theft.

Learn about the AI/ML threat: https://thehackernews.com/2024/01/tensorflow-cicd-flaw-exposed-supply.html
Assalamualaikum w.b.t semua,

Insya Allah pada malam ini 25/1/2024, akan diadakan majlis bacaan Yasin oleh pihak i-Radio DFM. Sesiapa berkelapangan boleh turut serta bagi mengimarahkan majlis ini.

Link : https://t.me/iRadioDFM

Live Bacaan Yaasin TikTok: https://www.tiktok.com/@dragonforceio
almassahotels.com.sa-db.csv
413 KB
SESUNGGUHNYA KAMI KECEWA WAHAI PEMIMPIN SAUDI ARABIA KERANA KAMU TIDAK MEMBANTU SAUDARA KITA DI PALESTINE
PADAHAL KAMU PALING BERKUASA UNTUK MENGAMBIL TINDAKAN ATAS KEZALIMAN DAN KEKEJAMAN WARGA ZIONIS ISRAEL

"WE ARE REALLY DISAPPOINTED O LEADER OF SAUDI ARABIA BECAUSE YOU ARE NOT HELPING OUR BROTHERS IN PALESTINE
EVEN THOUGH YOU ARE THE MOST POWERFUL TO TAKE ACTION AGAINST THE CRUELTY AND CRUELTY OF THE ZIONISTS"

SALAMFORCE24 BY DRADZIxs16 x @HelangMerahGroup ๐Ÿฆ…
SAUDI ARABIA DATABASE ๐Ÿฆ…

SITE: https://almassahotels.com.sa/

#ANON_BLACK_FLAG
#HelangMerahGroup
#stucxteam
#4-EXPLOITATION
#TeamCyberAbabil
โค1
"MEWARNAI SYURGA DIBUMI"
"SEHINGGA HILANG PEDOMAN DIRI"
"DIPERJUDI WANG DAN MASA"
"SEHINGGAKAN BERMURAM DURJA"
"DIGADAI BADAN JADI TONTONAN"
"SIFULAN KESAL JADI BUALAN"
Forwarded from แด›แด‡ษดษขแด‹แดส€แด€แด‹แด„สส™แด‡ส€แด„ส€แด‡แดก Official
A new attack targets Docker servers and uses a combo of cryptocurrency mining and website traffic generation for profit. It could leave a backdoor for attackers to exploit later.

Patch your systems and monitor for suspicious activity: https://thehackernews.com/2024/01/new-docker-malware-steals-cpu-for.html
Forwarded from Deleted Account
ุณู’ู€ู€ู€ู€ู€ู€ู€ู€ู€ู€ู€ู€ู€ู€ู€ู€ู€ู€ู…ู ุงู„ู„ู‡ู ุงู„ุฑูŽู‘ุญู’ู…ูŽู†ู ุงู„ุฑูŽู‘ุญููŠู’ู…ู

ุงู„ู„ู‡ ุฃูƒุจุฑ    ุงู„ู„ู‡ ุฃูƒุจุฑ    ุงู„ู„ู‡ ุฃูƒุจุฑ

ุฅู† ุดุงุก ุงู„ู„ู‡

We are legionโ—we do not forgiveโ—we do not forgetโ—expect usโ—

MASA DDOS : 0๏ธโƒฃ9๏ธโƒฃ : 0๏ธโƒฃ0๏ธโƒฃ pm
TARIKH : 19.JANUARI.2024

Target : https://pes-israel.co.il
IP : 5.100.248.70
Hostname : 5.100.248.70
ISP : O.M.C. COMPUTERS & COMMUNICATIONS LTD
Info : no waf

Port : 53 open domain
Port : 80 open http
Method : GET HEAD POST
Port : 443 open https
Method : GET HEAD POST
Method : TCP / UDP
๐Ÿ”ฅ4
Forwarded from 4 EXPLOITATION Channel
Indian Server Pwned by 3 Gabungan !!

"In misguided loyalty, one supports a cause indifferent, where echoes of care from the favored side remain nonexistent."


https://digigrowsolutions.in/
https://bblitz.in/

Zone-H > OK

@Exploitationn
4-EXP GG๐Ÿฆ…
โค1