Cyber Techโ„ข
57.9K subscribers
785 photos
9 videos
117 files
1.55K links
๐ŸŒ€ Basic to Advance Courses Of
๐ŸŒ€ Programming All Languages
๐ŸŒ€ Ethical Hacking Courses
๐ŸŒ€ Premium Accounts Giveaways
๐ŸŒ€Website- bit.ly/3vWBcfP

ใ€Š Paid Adverts Contact: @SID12O ใ€‹
๐Ÿ’น ๐˜—๐˜ข๐˜ณ๐˜ต ๐˜–๐˜ง @Anonymous_CreeWz ๐Ÿ’น
Download Telegram
Forwarded from Cyber Techโ„ข (H A C K โ˜ ๏ธ T E C H ๐Ÿ‡ฎ๐Ÿ‡ณ Tษจโ€ เธ„โ„•เบฎ -| ฯฮฑฮทโˆ‚ฮฑีน ใ€Ž๐™ท๐šŽ๐š’๐šœ๐š๐™ฒ๐š›๐šŽ๐š  ๐Ÿดโ€โ˜ ๏ธใ€)
This media is not supported in your browser
VIEW IN TELEGRAM
๐Ÿ–ค QR CODE PRO APP ON SALE

โ—ฝPRICE - 350โ‚น
โ—ฝSALE PRICE - FREE


โฌ‡ DOWNLOAD FREE ๐Ÿ”„

โž–โœ– @itsCybertech โœ–โž–
๐Ÿ”ฐNajeeb Lectures Accounts๐Ÿ”ฐ

RawanPanda@hotmail.com:Rawan852866
divyankgattani@gmail.com:capslock00
chan.brian07@gmail.com:guitar99
drsasidm@gmail.com:S75ubrou
saravana1202@gmail.com:905055536767
balazs.csepregi.96@gmail.com:66113311BalaZS
1996.raaghul@gmail.com:vettaikaran
uvgotlubna@gmail.com:lubnaz


โœ…( 110% Working When Uploaded โค๏ธ)

โš ๏ธ If You don't get the accounts it doesn't mean that it's fake it means the accounts was claimed by another user so be fast to claim โค๏ธโค๏ธ

๐ŸŒ€Don't Change anything for Longer usage
โค๏ธ๐Ÿ’ฏ

โž–โœ– @itsCybertech โœ–โž–
๐Ÿ”ฐ Special Alert ๐Ÿšจ News ๐Ÿ”ฐ

๐ŸŒ€ เคฌเฅ‰เคฒเฅ€เคตเฅเคก เคเค•เฅเคŸเคฐ เคธเฅเคถเคพเค‚เคค เคธเคฟเค‚เคน เคฐเคพเคœเคชเฅ‚เคค เคจเฅ‡ เค•เคฟเคฏเคพ เคธเฅเคธเคพเค‡เคก, เคฎเฅเค‚เคฌเคˆ เคฎเฅ‡เค‚ เค…เคชเคจเฅ‡ เค˜เคฐ เคฎเฅ‡เค‚ เคฒเค—เคพเคˆ เคซเคพเค‚เคธเฅ€.

๐Ÿ‘จโ€๐ŸŽค
#RIP_to_Him ๐Ÿ‘จโ€๐ŸŽค

๐Ÿ”ฅโ€œSuicide is man's way of telling God, 'You can't fire me - I quit!โ€๐Ÿ”ฅ

โค๏ธ Be Positive โค๏ธ


โž–โœ– @itsCybertech โœ–โž–
Forwarded from Cyber Techโ„ข (H A C K โ˜ ๏ธ T E C H ๐Ÿ‡ฎ๐Ÿ‡ณ Tษจโ€ เธ„โ„•เบฎ -| ฯฮฑฮทโˆ‚ฮฑีน ใ€Ž๐™ท๐šŽ๐š’๐šœ๐š๐™ฒ๐š›๐šŽ๐š  ๐Ÿดโ€โ˜ ๏ธใ€)
This media is not supported in your browser
VIEW IN TELEGRAM
๐Ÿ”ฐWiFi Jam on your Network using Android Mobile Phone๐Ÿ”ฐ

๐Ÿ’ข100% Working Mehtod of wifi jamming.

๐Ÿ’ขCompletely beginer friendly Mehtod.

โš ๏ธNOTE:- It can be deleted anytime ||

๐Ÿ”—Tutorial Link :-
https://bit.ly/2zuNtjU

โž–

โž–โœ– @itsCybertech โœ–โž–
Forwarded from Cyber Techโ„ข (H A C K โ˜ ๏ธ T E C H ๐Ÿ‡ฎ๐Ÿ‡ณ Tษจโ€ เธ„โ„•เบฎ -| ฯฮฑฮทโˆ‚ฮฑีน ใ€Ž๐™ท๐šŽ๐š’๐šœ๐š๐™ฒ๐š›๐šŽ๐š  ๐Ÿดโ€โ˜ ๏ธใ€)
This media is not supported in your browser
VIEW IN TELEGRAM
Hacking VoIP An Introduction to VoIP Security Book.pdf
4.3 MB
๐Ÿ”ฐHacking VoIP๐Ÿ”ฐ

โœ–๏ธ Protocols, Attacks and Countermeasures

โž– Share and Support โž–
A POWERPACK CRACKING BIBLE WITH LOTS OF TOOLS & TUTORIALS, THAT YOU CAN FOLLOW TO BECOME AN EXPERT CRACKER.

Download: https://systrick.xyz/ultimate-cracking-bible-free-download/
๐Ÿ“ณ : Force LTE Only v1.6.3 [AdFree] [Latest] apk
โž–โž–โž–โž–โž–โž–โž–โž–โž–โž–โž–โž–
๐Ÿ– : This app will help You change network to 4G/3G/2G and stay in chosen network.

โž–โž–โž–โž–โž–โž–โž–โž–โž–โž–โž–โž–
๐Ÿ”— https://dropgalaxy.in/gye8yg8qoq3r

โž–โž–โž–โž–โž–โž–โž–โž–โž–โž–โž–โž–

โž–โœ– @itsCybertech โœ–โž–
Forwarded from Cyber Techโ„ข (H A C K โ˜ ๏ธ T E C H ๐Ÿ‡ฎ๐Ÿ‡ณ Tษจโ€ เธ„โ„•เบฎ -| ฯฮฑฮทโˆ‚ฮฑีน ใ€Ž๐™ท๐šŽ๐š’๐šœ๐š๐™ฒ๐š›๐šŽ๐š  ๐Ÿดโ€โ˜ ๏ธใ€)
This media is not supported in your browser
VIEW IN TELEGRAM
๐Ÿ”˜ How To Make Configs in OB ๐Ÿ”˜
#tutorial
DOWNLOAD OB(OPENBULLET)

#TheStarkArmy
1. Go to the config tab in OpenBullet and press "New"
(Now it should show you the stacker)

2. Go to the site you want to create the config for and press "CTRL, SHIFT I" at the same time, Now go to Network and press record at the top right.

3. Now type in an incorrect USER:PASS/MAIL:PASS, After doing that you will see lots of diffrent names popup.

4. Filter threw these until you see the "Request Method: Post"
After you have this info just save the "Request URL" in a NotePad file.[/*]
Then save "Content-Type" (Which is on the same page)[/*]
For safe keeping I would save Origin and Referrer as well (its not always needed but I would recommend you do keep it)[/*]
Now save the "User-Agent"[/*]
And finally you want to save the Form Data[/*]
5. Return back to OpenBullet press the + icon then select "Request"
In Request you want to put the 1st URL we got where it says "URL:"[/*]
Change the method to "POST"[/*]
Now go to "Content-Type:" and paste what we saved in notepad.[/*]
Replace "Custom Headers:" with the one we got earlier & add the Origin, Referrer we got earlier underneath (Put Origin and Referrer on a new line underneath)[/*]
Now put the Form Data in the "POST Data" box, Now you want to change the username you entered to <USER> and change the password to <PASS>[/*]
Now run the DeBugger.

Key Check

Press the + and add a "Key Check"
Change the type to failure
Paste the error message for a incorrect user:pass eg (ACCESS DENIED! or PASSWORD INCORRECT)
Now press the "Key Chains +" and add a success block.
Now press the + which can be seen at "Keys +" and just type something that you see when you sign in to a working account eg (Welcome!, Login Success)
Now were done! Don't Forget to save your config :D

TYPES OF CONFIGS
Loli Configs โ€“ Is the original OpenBullet config type. Its unsecure if you are selling configs using .loli as its unencrypted.
CTO Configs โ€“ Are configs that are made for Cracked.to Exclusive
Anom Config โ€“ Anom configs are configs which are made for the Anomly OpenBullet.
Modded Open Bullet Downloads:

Make admin : @Mr_Neophyte
โ™ป๏ธShare and support usโ™ป๏ธ

โž–โœ– @itsCybertech โœ–โž–
๐Ÿ”ฐ Hack Wifi In 15 Mintues ๐Ÿ”ฐ

Go.
1. Download kali linux - https://www.kali.org/downloads/
1.1 Install Kali Linux on a USB flash drive or virtual machine
1.3 Run from a USB flash drive or virtual machine under Kali
2. Open the console
2.1 We write: iwconfig and check if our LAN card! If you have problems at this moment (this will not happen with laptops), then you need to buy this card. For 300 you can take a usb tplink card or alfa adaptors are best.
2.2 Now we turn on the monitoring mode: airmon-ng start wlan0 (vlan0 is the value from the parameters of the network card, you may have a slightly different one, for example mon0)
2.3 Now you need to scan: airodump-ng wlan0
2.4 Here we will see a list of Wi-Fi networks within the radius of our device, it depends on the network card. Here we need to select the target of the attack, we choose according to your taste, I usually take the one who has the best signal (The signal level is determined by the abbreviation pwr)
2.5 Now we need to press ctrl + c and stop scanning
2.6 Select the victim and write: airodump-ng --bssid ( here we write the bsidey of the victim's router, you see it above) --channel (here we write the channel, it is indicated as ch, for example 1 or 8) -w / tmp / nazvanie (this is the path where the final file and name will be) wlan0
2.7 At the very bottom we see those who are connected to the network, we select the one with a larger number in the Frames value (it is more active)
3. Open another console and write: aireplay-ng -0 1 (1 - this is the number of deauthorization packages, immediately put 50 and wait) -a (here we write the routerโ€™s sideside, we see it in the very top line where its characteristics: level signal, channel, etc.) -s (poppy address of the user we are attacking, you can find out his poppy under STATION) wlan0
3.1 We wait until there is an inscription with a handshake in the first console, it will be indicated there for a while, it will be at the top. We do this command in the second console until the handshake passes. If it doesnโ€™t work at all, then we write this command instead of the one: aireplay-ng -0 1 -a AP_BSSID -c CLIENT_BSSID mon0 โ€”ignore-negative-one (this is for Android devices), you can still deauthorize the entire network at once aireplay-ng --deauth 5 -a (here you register the router poppy) wlan0
#TheStarkArmy
4. When we received the handshake, we go along the path that we indicated and:
4.1 Decrypt this hash ourselves, give people who can do it
4.2 Turn to the https://xsrc.ru service (not ads) and throw the hash here, it quickly finds ( I have in a couple of seconds), it may be longer, but obviously faster than on my laptop in 2009: D
After decryption, you will receive a notification letter in the mail, and to get the password you need a key, 1 costs 100, the more - the cheaper. This is the only negative of this method, but I prefer it. After purchasing the key, it will come to the post office, then enter it on the site and you're done.
That's ready, then with ours, now ours! we do what we want with the network: we replace the DNS, listen to traffic or just watch movies and sit on our favorite forum :)

http://wpa-sec.stanev.org/ Service for decrypting hashes for free,

A few words about security at work:
If you use this method in your neighbors, at school, university, and other simple places - it does not matter. If you go to the office, company, or any place that has important data - get ready. Learn basic security concepts in kali linux. Although vryatli in + - a serious company has the simplest protection that can be opened in this way. Usually. They have data going through their server, which needs to be broken in order to get a password.
On security, when you are sitting in a hacked / free wifi point, Iโ€™ll tell you a couple of rules:
Use a VPN
Try not to log in to important services
Or use a VPN + TOP bundle
Or instead of vpn you can use ssh tunnel

Posted by : @Mr_Neophyte
โ™ป๏ธShare and support usโ™ป๏ธ

โž–โœ– @itsCybertech โœ–โž–
12.55 GB Vectors & Icons Pack Free Download


Download
: https://systrick.xyz/12-55-gb-vectors-icons-pack-free-download/
Download fast before it gets deleted ๐Ÿ‘†
it's a premium pack, it's useful for graphic designers
Forwarded from Cyber Techโ„ข (H A C K โ˜ ๏ธ T E C H ๐Ÿ‡ฎ๐Ÿ‡ณ Tษจโ€ เธ„โ„•เบฎ -| ฯฮฑฮทโˆ‚ฮฑีน ใ€Ž๐™ท๐šŽ๐š’๐šœ๐š๐™ฒ๐š›๐šŽ๐š  ๐Ÿดโ€โ˜ ๏ธใ€)
This media is not supported in your browser
VIEW IN TELEGRAM
How to Track Anyone by Sending Them a Message ๐Ÿ”ฐ

1) Go to Grabify and make your account there by clicking on register.

2) Get the link (URL) of anything you want to send like wallpaper, music, video, etc.

3) Now login to Grabify.

4) After loggin in to Grabify, go to home page. There you will see a box where you can paste url. So, paste the copied url in that box and click on create url.

5) After this, URL will be created and you will be redirected to the page where you will see new URLs.

6) Now copy the newly generated URL or google URL (anyone) and send it to that person whom you want to track. You can use any social media platform like Facebook, Whatsapp, Telegram or you can send directly to their phones as a sms.

Okay so here we have got the IP Address of the user whom we wanted to trace. Now let's get some more information about him/her.

So, to get information about user, copy the IP address of that person and go to IP2Location and paste IP address there.

So, now just copy the Longitude and Latitude of the user that you got in the previous step and search it on Google, you will get map location.

Share this post to people who are in need โœ…

โž–โœ– @itsCybertech โœ–โž–
This media is not supported in your browser
VIEW IN TELEGRAM
๐Ÿ”ฐ Flipkart Accounts๐Ÿ”ฐ

dollypavan341@gmail.com:dollynpavan
rakesh.akp@gmail.com:akprakesh
deepeshshankar82@gmail.com:admindp82
sushilgautam2008@gmail.com:9210420531
deepeshshankar82@gmail.com:admindp82

โž–โœ– @itsCybertech โœ–โž–