57.5K subscribers
785 photos
9 videos
117 files
1.55K links
🌀 Basic to Advance Courses Of
🌀 Programming All Languages
🌀 Ethical Hacking Courses
🌀 Premium Accounts Giveaways
🌀Website- bit.ly/3vWBcfP

《 Paid Adverts Contact: @SID12O
💹 𝘗𝘢𝘳𝘵 𝘖𝘧 @Anonymous_CreeWz 💹
Download Telegram
🔰 Python 3.7 Beginner's Bootcamp 2020 🔰

Learn Python 3 from scratch with Python 3 Assignments.

Link :-
https://anontricks.tech/python-3-7-beginners-bootcamp-2020/

Share And Support Us ❗️
Linux_Basics_for_Hackers_Getting_Started_with_Networking,_Scripting.pdf
14.2 MB
🔰 LINUX BASICS FOR HACKERS 🔰

🔻Getting Started with Networking, Scripting, and Security in Kali

Share and Support Us
Forwarded from Cyber Tech (H A C K ☠️ T E C H 🇮🇳 -| ραη∂αչ |- Tɨ†คℕຮᵗᶬ)
This media is not supported in your browser
VIEW IN TELEGRAM
Forwarded from Cyber Tech (H A C K ☠️ T E C H 🇮🇳 -| ραη∂αչ |- Tɨ†คℕຮᵗᶬ)
This media is not supported in your browser
VIEW IN TELEGRAM
Cyber Tech pinned Deleted message
Forwarded from ☠️ Hate Hacker 💻
This media is not supported in your browser
VIEW IN TELEGRAM
🎩 How do I hack someone computer or mobile by his/her ip address? 🎩

First of all you need to know the difference between the two types of ip address,i.e.
static ip and dynamic ip.

Most of the people doesn't have a static ip. Only some big organization or companies have static ip address. On the other hand almost every common person have dynamic ip connection. Dynamic ip means that, every time you disconnect and reconnect to the internet, your system is assigned a completely new ip address.
Whereas in static ip, it doesn't matter how many times you reconnect to the internet, your ip would be the same everytime

If you are planning to attack someone who is having a static ip connection then you can move on. But if the victim is having a dynamic ip connection then you can not guess the validity of that ip.

In this case if the victim disconnects and reconnect to the internet then you have to obtain the ip address once again. So i think you got the differences between the two types of ip address by now.

Now back to the question. Even if you have the victim's ip address, its not going to help you unless there is a backdoor in the victim's system. By backdoor, i mean an open port that can listen to and reply back to your data packets. This can even be done if there is a vulnerable application present in victim's system. The best example of a backdoor is something known as the trojan horse or RAT standing for remote administration tool. So i think you've got answer to your question.

Posted by : @Mr_Neophyte
🦠Share and support us🦠
🆔 𝙼𝚘𝚟𝚒𝚎𝚜 𝚃𝚒𝚖𝚎 𝙰𝙿𝙺 (𝙰𝚍 𝙵𝚛𝚎𝚎, 𝙼𝙾𝙳)

𝚆𝚊𝚝𝚌𝚑 𝚘𝚛 𝙳𝚘𝚠𝚗𝚕𝚘𝚊𝚍 𝟷𝟶𝟶𝟶𝟶+ 𝙼𝚘𝚟𝚒𝚎𝚜, 𝚆𝚎𝚋 𝚂𝚎𝚛𝚒𝚎𝚜 & 𝙻𝚒𝚟𝚎 𝚃𝚅 (𝙽𝚎𝚝𝚏𝚕𝚒𝚡, 𝙷𝚘𝚝𝚜𝚝𝚊𝚛, 𝙿𝚛𝚒𝚖𝚎 𝚅𝚒𝚍𝚎𝚘 𝙲𝚘𝚗𝚝𝚎𝚗𝚝 𝙰𝚍𝚍𝚎𝚍)

𝚄𝙸 𝚒𝚜 𝙰𝚠𝚎𝚜𝚘𝚖𝚎, 𝙵𝚊𝚜𝚝 𝚂𝚎𝚛𝚟𝚎𝚛𝚜

📥 𝙳𝚘𝚠𝚗𝚕𝚘𝚊𝚍 𝚕𝚒𝚗𝚔 : -

🔗 https://dropgalaxy.in/nshpgfzsbuer


This media is not supported in your browser
VIEW IN TELEGRAM
This media is not supported in your browser
VIEW IN TELEGRAM
🔰 Beginners' Financial Market: Assets, Players, & Investments 🔰

Know the basics of investment and the players & the nature of financial markets.

Link :-
https://anontricks.tech/beginners-financial-market-assets-players-investments/

Share And Support Us ❗️
This media is not supported in your browser
VIEW IN TELEGRAM
Forwarded from ☠️ Hate Hacker 💻
This media is not supported in your browser
VIEW IN TELEGRAM
Forwarded from Cyber Tech (H A C K ☠️ T E C H 🇮🇳 -| ραη∂αչ |- Tɨ†คℕຮᵗᶬ)
This media is not supported in your browser
VIEW IN TELEGRAM
Learning Network Penetration
Testing
Video

@itscybertech
Learning_Network_Penetration_Testing---@learningnets.rar
665.2 MB
Forwarded from Cyber Tech (H A C K ☠️ T E C H 🇮🇳 -| ραη∂αչ |- Tɨ†คℕຮᵗᶬ)
This media is not supported in your browser
VIEW IN TELEGRAM
Windows Hacking/Red teaming resources | @itscybertech
Forwarded from Cyber Tech (H A C K ☠️ T E C H 🇮🇳 -| ραη∂αչ |- Tɨ†คℕຮᵗᶬ)
This media is not supported in your browser
VIEW IN TELEGRAM