GET ALL KALI TOOLS ON TERMUX #fastTips
1) apt update
2) apt install git
3) git clone https://github.com/rajkumardusad/onex.git
4) chmod +x onex/install
5) sh onex/install if not work than use ./onex/install
6) COMMANDS :
onex install [tool_name] install any tool.
onex -i [tool_name] install any tool.
onex search [tool_name] search any tool.
onex -s [tool_name] search any tool.
onex list list all tools.
onex list -a list all tools.
onex -l list all tools.
onex -l -a list all tools.
onex help get help.
onex -h get help.
1) apt update
2) apt install git
3) git clone https://github.com/rajkumardusad/onex.git
4) chmod +x onex/install
5) sh onex/install if not work than use ./onex/install
6) COMMANDS :
onex install [tool_name] install any tool.
onex -i [tool_name] install any tool.
onex search [tool_name] search any tool.
onex -s [tool_name] search any tool.
onex list list all tools.
onex list -a list all tools.
onex -l list all tools.
onex -l -a list all tools.
onex help get help.
onex -h get help.
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Which shortener url pay highest $ ?
1) Shorte.ST stats :
No. of Registered users: 1,017,836
Total URLs shortened: 1,758,071,729
Total URLs clicked: 6,679,203
Highest CPM: $14.04 for US traffic
βͺοΈwww.Shorte.ST
2) Adf.LY stats:
No. of Registered users: 5,373,907
Total URLs clicked: 1,413,375 daily clicks
Highest CPM: $22.18 for unique visits from the US
Worldwide CPM: $0.25 β $2.00
βͺοΈ www.Adf.LY
3) Ouo.IO stats:
No. of Registered users: 1,080,000+
Total URLs shortened: 275,000,000+
Total URLs clicked: 1,200,000+ clicks per day
Highest CPM: $5 for AUS traffic
Worldwide CPM: $1.5
βͺοΈwww.Ouo.IO
4) ShrinkMe.IO stats:
No. of Registered users: 9,161
Total URLs shortened: 93,110
Total URLs clicked: 1,740,721
Highest CPM: $22 for Greenland traffic
Worldwide CPM: $3.50
βͺοΈwww.ShrinkMe.IO
THIEIR IS MANY MORE BUT THOSE ONLY STATS IN 2019-2020
E N J O Y β€οΈππ»
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Which shortener url pay highest $ ?
1) Shorte.ST stats :
No. of Registered users: 1,017,836
Total URLs shortened: 1,758,071,729
Total URLs clicked: 6,679,203
Highest CPM: $14.04 for US traffic
βͺοΈwww.Shorte.ST
2) Adf.LY stats:
No. of Registered users: 5,373,907
Total URLs clicked: 1,413,375 daily clicks
Highest CPM: $22.18 for unique visits from the US
Worldwide CPM: $0.25 β $2.00
βͺοΈ www.Adf.LY
3) Ouo.IO stats:
No. of Registered users: 1,080,000+
Total URLs shortened: 275,000,000+
Total URLs clicked: 1,200,000+ clicks per day
Highest CPM: $5 for AUS traffic
Worldwide CPM: $1.5
βͺοΈwww.Ouo.IO
4) ShrinkMe.IO stats:
No. of Registered users: 9,161
Total URLs shortened: 93,110
Total URLs clicked: 1,740,721
Highest CPM: $22 for Greenland traffic
Worldwide CPM: $3.50
βͺοΈwww.ShrinkMe.IO
THIEIR IS MANY MORE BUT THOSE ONLY STATS IN 2019-2020
E N J O Y β€οΈππ»
β β β Uππ»βΊπ«Δπ¬πβ β β β
Forwarded from Backup Legal Mega
π¦Updated Beyond Beginner GameMaker Studio 2 - Creating A Full Tower Defense Game From Scratch for beginer & experts
βtop ratingβ
β5.8 GBβ
https://www.skillshare.com/classes/Beyond-Beginner-GameMaker-Studio-2-Creating-A-Full-Tower-Defense-Game-From-Scratch/3495473
https://mega.nz/folder/LwsliQJQ#L4kJ4fWP-Yt7764-75HO4g
βtop ratingβ
β5.8 GBβ
https://www.skillshare.com/classes/Beyond-Beginner-GameMaker-Studio-2-Creating-A-Full-Tower-Defense-Game-From-Scratch/3495473
https://mega.nz/folder/LwsliQJQ#L4kJ4fWP-Yt7764-75HO4g
mega.nz
5.8 GB folder on MEGA
115 files
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦ANOTHER BITCOIN HACKING
-Bruteforce wallet
The purpose of this program is to try to find the password of an
encrypted Peercoin (or Bitcoin, Litecoin, etc...) wallet file (i.e. wallet.dat).
It can be used in two ways:
βtry all the possible passwords given a charset
βtry all the passwords in a file
There is a command line option to specify the number of threads to use.
Sending a USR1 signal to a running bruteforce-wallet process makes it print progress and continue
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1οΈβ£apt install libdb-dev libssl-dev -y
2οΈβ£git clone https://github.com/glv2/bruteforce-wallet.git
3οΈβ£./autogen.sh
4οΈβ£Then, build the program with the commands:
./configure
make
5οΈβ£make install
6οΈβ£EXAMPLES :
1) Try to find the password of an encrypted wallet file using 4 threads, trying only passwords with 5 characters:
bruteforce-wallet -t 4 -l 5 -m 5 wallet.dat
2) Try to find the password of an encrypted wallet file using 8 threads, trying only passwords with 5 to 10 characters beginning with "W4l" and ending with "z":
bruteforce-wallet -t 8 -l 5 -m 10 -b "W4l" -e "z" wallet.dat
3) Try to find the password of an encrypted wallet file using 8 threads, trying only passwords with 10 characters using the character set "P8Ε":
bruteforce-wallet -t 8 -l 10 -m 10 -s "Pζ 8Ε" wallet.dat
4) Try to find the password of an encrypted wallet file using 6 threads, trying the passwords contained in a dictionary file:
bruteforce-wallet -t 6 -f dictionary.txt wallet.dat
5) Print progress info:
pkill -USR1 -f bruteforce-wallet
6) Print progress info every 30 seconds:
bruteforce-wallet -t 6 -f dictionary.txt -v 30 wallet.dat
7) Save/restore state between sessions:
bruteforce-wallet -t 6 -f dictionary.txt -w state.txt wallet.dat
> (Let the program run for a few minutes and stop it)
bruteforce-wallet -t 6 -w state.txt wallet.dat
π¦Tested by undercode on :
> parrot
> ubuntu
> kali
ENJOYβ€οΈππ»
β Topic git
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦ANOTHER BITCOIN HACKING
-Bruteforce wallet
The purpose of this program is to try to find the password of an
encrypted Peercoin (or Bitcoin, Litecoin, etc...) wallet file (i.e. wallet.dat).
It can be used in two ways:
βtry all the possible passwords given a charset
βtry all the passwords in a file
There is a command line option to specify the number of threads to use.
Sending a USR1 signal to a running bruteforce-wallet process makes it print progress and continue
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1οΈβ£apt install libdb-dev libssl-dev -y
2οΈβ£git clone https://github.com/glv2/bruteforce-wallet.git
3οΈβ£./autogen.sh
4οΈβ£Then, build the program with the commands:
./configure
make
5οΈβ£make install
6οΈβ£EXAMPLES :
1) Try to find the password of an encrypted wallet file using 4 threads, trying only passwords with 5 characters:
bruteforce-wallet -t 4 -l 5 -m 5 wallet.dat
2) Try to find the password of an encrypted wallet file using 8 threads, trying only passwords with 5 to 10 characters beginning with "W4l" and ending with "z":
bruteforce-wallet -t 8 -l 5 -m 10 -b "W4l" -e "z" wallet.dat
3) Try to find the password of an encrypted wallet file using 8 threads, trying only passwords with 10 characters using the character set "P8Ε":
bruteforce-wallet -t 8 -l 10 -m 10 -s "Pζ 8Ε" wallet.dat
4) Try to find the password of an encrypted wallet file using 6 threads, trying the passwords contained in a dictionary file:
bruteforce-wallet -t 6 -f dictionary.txt wallet.dat
5) Print progress info:
pkill -USR1 -f bruteforce-wallet
6) Print progress info every 30 seconds:
bruteforce-wallet -t 6 -f dictionary.txt -v 30 wallet.dat
7) Save/restore state between sessions:
bruteforce-wallet -t 6 -f dictionary.txt -w state.txt wallet.dat
> (Let the program run for a few minutes and stop it)
bruteforce-wallet -t 6 -w state.txt wallet.dat
π¦Tested by undercode on :
> parrot
> ubuntu
> kali
ENJOYβ€οΈππ»
β Topic git
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - glv2/bruteforce-wallet: Try to find the password of an encrypted Peercoin (or Bitcoin, Litecoin, etc...) wallet file.
Try to find the password of an encrypted Peercoin (or Bitcoin, Litecoin, etc...) wallet file. - glv2/bruteforce-wallet
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Methode about- NEC broke a large number of security loopholes, or will affect all small and medium-sized enterprises and governments!
βͺοΈWhich methode they use ? & How ?
#News
Japan's NEC is one of the world's leading suppliers of IT and communication networks and one of the world's top 500 companies. NEC is mainly engaged in the research and development, cluster software, production and sales of IT services, platform business, operator networks, social infrastructure, personal solutions and other products. There are more than 15,000 products. NEC conducts business in more than 150 countries and regions around the world , Integrate advanced information technology and network technology to provide excellent comprehensive solutions to governments, enterprises and individuals.
However, on July 30, NEC was exposed to a large number of security vulnerabilities in its communications products and solutions. Many of its communications servers and telephone switches were recruited, which may affect all small and medium-sized enterprises and governments. It should be noted that these vulnerabilities that were exposed have existed last year.
The following are the details of the vulnerability:
1. CVE-2019-20025: Static user authentication credentials provide manufacturer-level access to the web configuration utility.
CVSS score: 9.8 (serious)
NEC SV9100 is a unified communication solution of NEC Corporation. Its IP communication server UNIVERGE SV9100 is a feature-rich unified communication function system used by thousands of small and medium-sized enterprises. Some specific versions of SV9100 software It may allow remote unauthenticated attackers to use hard-coded user names and passwords (also known as static certificate vulnerabilities) to log in to devices running affected versions. The vulnerability is caused by an undocumented user account with the manufacturer's privilege level. An attacker can exploit this vulnerability by using this account to remotely log in to the affected device. Successful exploitation of this vulnerability could allow an attacker to log in to the device with manufacturer-level access rights. This vulnerability affects SV9100 PBX running software version 6.0 or higher. This vulnerability does not affect SV9100 software versions before 6.0.
2. CVE-2019-20026: The password reset function can be accessed from an unprivileged context.
The WebPro interface in SV9100 software version 7.0 or later allows an unauthenticated remote attacker to reset all existing usernames and passwords to default values ββthrough a carefully designed request.
CVSS score: 9.8 (serious)
3. CVE-2019-20027: A potentially misconfigured system may allow successful authentication using blank credentials.
Aspir (phone system) derivative products NEC PBX switches, including SV8100, SV9100, SL1100 and SL2100 with software version, if not configured properly, it may allow entering a blank username and password combination as a valid successful authentication account.
CVSS score: 6.4 (medium)
4. CVE-2019-20028: Access to voice mail from a web server without authentication
NEC PBX, a derivative of Aspire running InMail software (including SV8100, SV9100, SL1100 and SL2100), allows unauthenticated read-only access to voice mail, greetings, and voice response system content through the system's WebPro management interface.
CVSS score: 7.5 (high)
5. CVE-2019-20029: Privilege escalation allows hidden developer access in the web configuration utility.
There is an exploitable privilege escalation vulnerability in the WebPro function of NEC PBX from Aspire. The affected products and versions include SV8100, SV9100, SL1100 and SL2100. A specially crafted HTTP POST may lead to privilege escalation, resulting in higher privileged accounts, including undocumented developer access.
CVSS score: 8.8 (high)
6. CVE-2019-20030: Able to access the local network through the voice mail system.
π¦Methode about- NEC broke a large number of security loopholes, or will affect all small and medium-sized enterprises and governments!
βͺοΈWhich methode they use ? & How ?
#News
Japan's NEC is one of the world's leading suppliers of IT and communication networks and one of the world's top 500 companies. NEC is mainly engaged in the research and development, cluster software, production and sales of IT services, platform business, operator networks, social infrastructure, personal solutions and other products. There are more than 15,000 products. NEC conducts business in more than 150 countries and regions around the world , Integrate advanced information technology and network technology to provide excellent comprehensive solutions to governments, enterprises and individuals.
However, on July 30, NEC was exposed to a large number of security vulnerabilities in its communications products and solutions. Many of its communications servers and telephone switches were recruited, which may affect all small and medium-sized enterprises and governments. It should be noted that these vulnerabilities that were exposed have existed last year.
The following are the details of the vulnerability:
1. CVE-2019-20025: Static user authentication credentials provide manufacturer-level access to the web configuration utility.
CVSS score: 9.8 (serious)
NEC SV9100 is a unified communication solution of NEC Corporation. Its IP communication server UNIVERGE SV9100 is a feature-rich unified communication function system used by thousands of small and medium-sized enterprises. Some specific versions of SV9100 software It may allow remote unauthenticated attackers to use hard-coded user names and passwords (also known as static certificate vulnerabilities) to log in to devices running affected versions. The vulnerability is caused by an undocumented user account with the manufacturer's privilege level. An attacker can exploit this vulnerability by using this account to remotely log in to the affected device. Successful exploitation of this vulnerability could allow an attacker to log in to the device with manufacturer-level access rights. This vulnerability affects SV9100 PBX running software version 6.0 or higher. This vulnerability does not affect SV9100 software versions before 6.0.
2. CVE-2019-20026: The password reset function can be accessed from an unprivileged context.
The WebPro interface in SV9100 software version 7.0 or later allows an unauthenticated remote attacker to reset all existing usernames and passwords to default values ββthrough a carefully designed request.
CVSS score: 9.8 (serious)
3. CVE-2019-20027: A potentially misconfigured system may allow successful authentication using blank credentials.
Aspir (phone system) derivative products NEC PBX switches, including SV8100, SV9100, SL1100 and SL2100 with software version, if not configured properly, it may allow entering a blank username and password combination as a valid successful authentication account.
CVSS score: 6.4 (medium)
4. CVE-2019-20028: Access to voice mail from a web server without authentication
NEC PBX, a derivative of Aspire running InMail software (including SV8100, SV9100, SL1100 and SL2100), allows unauthenticated read-only access to voice mail, greetings, and voice response system content through the system's WebPro management interface.
CVSS score: 7.5 (high)
5. CVE-2019-20029: Privilege escalation allows hidden developer access in the web configuration utility.
There is an exploitable privilege escalation vulnerability in the WebPro function of NEC PBX from Aspire. The affected products and versions include SV8100, SV9100, SL1100 and SL2100. A specially crafted HTTP POST may lead to privilege escalation, resulting in higher privileged accounts, including undocumented developer access.
CVSS score: 8.8 (high)
6. CVE-2019-20030: Able to access the local network through the voice mail system.
There are security loopholes in NEC UM8000 (a voice mail solution). Attackers with modem access numbers on NEC UM8000 voice mail systems can use SSH tunnels or standard Linux utilities to access the systemβs LAN ports.
CVSS score: 10.0 (serious)
7. CVE-2019-20031: The risk of brute force attacks on voicemail passwords has been mitigated.
NEC UM8000, UM4730 and previous non-InMail voicemail systems with all known software versions may allow countless login attempts in the telephone user interface (TUI), effectively performing a brute force attack.
CVSS score: 7.7 (high)
8. CVE-2019-20032: "Find me/follow me" function allows access to the modem interface from any voice mailbox
The attacker can access the InMail voice mailbox equipped with the "find/follow me" function on NEC PBX (including SV8100, SV9100, SL1100 and SL2100) derived from Aspire, and can access the system's management modem.
CVSS score: 7.1 (high)
9. CVE-2019-20033: The accessible DIM interface after establishing a PPP connection has static user authentication credentials.
On NEC PBX (including SV8100), a derivative of Aspire, a set of documented static login credentials can be used to access the DIM interface.
CVSS score: 9.8 (serious)
Bug fix
At present, NEC company has not released repair measures to solve this security problem. It is recommended that users who use this communication solution pay attention to the NEC homepage or refer to the website for solutions: https://www.nec.com/
ENJOYβ€οΈππ»
β Topic git
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
CVSS score: 10.0 (serious)
7. CVE-2019-20031: The risk of brute force attacks on voicemail passwords has been mitigated.
NEC UM8000, UM4730 and previous non-InMail voicemail systems with all known software versions may allow countless login attempts in the telephone user interface (TUI), effectively performing a brute force attack.
CVSS score: 7.7 (high)
8. CVE-2019-20032: "Find me/follow me" function allows access to the modem interface from any voice mailbox
The attacker can access the InMail voice mailbox equipped with the "find/follow me" function on NEC PBX (including SV8100, SV9100, SL1100 and SL2100) derived from Aspire, and can access the system's management modem.
CVSS score: 7.1 (high)
9. CVE-2019-20033: The accessible DIM interface after establishing a PPP connection has static user authentication credentials.
On NEC PBX (including SV8100), a derivative of Aspire, a set of documented static login credentials can be used to access the DIM interface.
CVSS score: 9.8 (serious)
Bug fix
At present, NEC company has not released repair measures to solve this security problem. It is recommended that users who use this communication solution pay attention to the NEC homepage or refer to the website for solutions: https://www.nec.com/
ENJOYβ€οΈππ»
β Topic git
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
NEC Global
NEC Group under the Solution for Society principle delivers safety, security, fairness and efficiency to our society with our partners around the globe.
π¦Methode about- NEC broke a large number of security loopholes, or will affect all small and medium-sized enterprises and governments!
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦2020 Π‘ΠΏΠΈΡΠΎΠΊ ΡΠ΅ΠΌ DarkNet Π‘ΠΏΠΈΡΠΎΠΊ ΡΠ°ΠΉΡΠΎΠ² Π΄Π»Ρ ΡΡΡΡΠΊΠΎΡΠ·ΡΡΠ½ΡΡ ΠΏΠΎΠ»ΡΠ·ΠΎΠ²Π°ΡΠ΅Π»Π΅ΠΉ:
- 2020 Topic list DarkNet list of sites for Russian-speaking users:
http://lwplxqzvmgu43uff.onion - Runion, Anonymous Forum: Bitcoin, Tor, Free Market;
http://bitmixbizymuphkc.onion is the best bitcoin mixer , you can mix BTC, ETH, LTC.
buybit4xcbat2cwn.onion RU BuyBit - instant purchase and sale of bitcoin (with Qiwi integration), the service does not require any confirmation and accepts payment from terminals. Good online support that solves your questions online. Online discussion;
http://totetxidh73fm4e3.onion - Totet, bitcoin tote;
https://onion.cab - clearnet (!) onion.cab, view hidden onion sites without Tor;
http://facebookcorewwwi.onion - Facebook, the same one));
http://sms4tor3vcr2geip.onion - SMS4TOR, a self-destruct message service;
http://oi4bvjslpt5gabjq.onion - RΓ©publique de Hackers, another hacker forum in French;
http://pwoah7foa6au2pul.onion - Alphabay market;
http://mail2tor2zyjdctd.onion - Mail2Tor, e-mail service;
http://torbox3uiot6wchz.onion - TorBox, e-mail service inside .onion;
http://zw3crggtadila2sg.onion/imageboard - TorChan, "Tor's # 1 imageboard";
http://cyjabr4pfzupo7pg.onion - CYRUSERV, a jabber service from CYRUSERV;
http://rutorc6mqdinc4cz.onion - RuTor.org, a well-known torrent tracker;
http://flibustahezeous3.onion is a famous electronic library in an onion version.
enjoyβ€οΈππ»
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦2020 Π‘ΠΏΠΈΡΠΎΠΊ ΡΠ΅ΠΌ DarkNet Π‘ΠΏΠΈΡΠΎΠΊ ΡΠ°ΠΉΡΠΎΠ² Π΄Π»Ρ ΡΡΡΡΠΊΠΎΡΠ·ΡΡΠ½ΡΡ ΠΏΠΎΠ»ΡΠ·ΠΎΠ²Π°ΡΠ΅Π»Π΅ΠΉ:
- 2020 Topic list DarkNet list of sites for Russian-speaking users:
http://lwplxqzvmgu43uff.onion - Runion, Anonymous Forum: Bitcoin, Tor, Free Market;
http://bitmixbizymuphkc.onion is the best bitcoin mixer , you can mix BTC, ETH, LTC.
buybit4xcbat2cwn.onion RU BuyBit - instant purchase and sale of bitcoin (with Qiwi integration), the service does not require any confirmation and accepts payment from terminals. Good online support that solves your questions online. Online discussion;
http://totetxidh73fm4e3.onion - Totet, bitcoin tote;
https://onion.cab - clearnet (!) onion.cab, view hidden onion sites without Tor;
http://facebookcorewwwi.onion - Facebook, the same one));
http://sms4tor3vcr2geip.onion - SMS4TOR, a self-destruct message service;
http://oi4bvjslpt5gabjq.onion - RΓ©publique de Hackers, another hacker forum in French;
http://pwoah7foa6au2pul.onion - Alphabay market;
http://mail2tor2zyjdctd.onion - Mail2Tor, e-mail service;
http://torbox3uiot6wchz.onion - TorBox, e-mail service inside .onion;
http://zw3crggtadila2sg.onion/imageboard - TorChan, "Tor's # 1 imageboard";
http://cyjabr4pfzupo7pg.onion - CYRUSERV, a jabber service from CYRUSERV;
http://rutorc6mqdinc4cz.onion - RuTor.org, a well-known torrent tracker;
http://flibustahezeous3.onion is a famous electronic library in an onion version.
enjoyβ€οΈππ»
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦How recover any hacked youtube channel ?
Fix a hacked YouTube account - Official Support
βPlease read ALL of this carefully, and do NOT ignore any part. If you do- you lower your chances of getting help from me.
#requested
a) In order to deal with a hacking you must first "report" (it's not really a report, but it does trigger something at their end) the Google Account's hacking to Google. For this you need to follow instructions here: https://support.google.com/youtube/answer/76187, and pick the instructions according to what applies to your case. But you must do it as best you can, before moving on to:
b) Then (and only then. Meaning that you must do a) above before you do this, part b)) please can you contact me in private on Google Hangouts: https://hangouts.google.com/chat/person/104217083390665628628 with* (as in- do not contact me without it because I will ignore you) the following info
1) The URL of this, your** thread (for my reference), and without which I cannot assist you,
2) The unique /channel/ URL (no other URL will do) of your YouTube channel (which, by the way, is: https://www.youtube.com/channel/UC5ouqw6hydKaGHWEGoaYieg
3) The email address you use for your hacked Google Account,
Full (URLs/email headers included) screen-grabs of the notifications Google would have sent you about the hacking,
4) Indication of any changes made by the hacker (videos uploaded, name/artwork changed etc)
5) An indication of when this happened, and-
confirm here if you can use the email in 3. above (if not- can you provide an alternative contact email, preferably one used by your Google Account in some way)
Once I have it, I will pass the info onto YouTube support. And, maybe YouTube support will be able to assist. Note the "maybe". Because there are no guarantees that the hijacking team will be able verify that hacking took place if there wasn't a hacking as such.
I, personally, wont be told much because it is obviously confidential to you, but I do suggest that you stand by in case they need more info and ask me/you directly. But, remember, they only can try to help you if you've done a) above.
c) Once you have regained control/access of your Google Account it is important/essential that you initiate two-step verification:https://www.google.com/landing/2step/ and get a decent virus detection/removal software for your devices to protect your Google Account in future. More here (and you really should read it): https://support.google.com/accounts/answer/46526
enjoyβ€οΈππ»
By Youtube Administration
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦How recover any hacked youtube channel ?
Fix a hacked YouTube account - Official Support
βPlease read ALL of this carefully, and do NOT ignore any part. If you do- you lower your chances of getting help from me.
#requested
a) In order to deal with a hacking you must first "report" (it's not really a report, but it does trigger something at their end) the Google Account's hacking to Google. For this you need to follow instructions here: https://support.google.com/youtube/answer/76187, and pick the instructions according to what applies to your case. But you must do it as best you can, before moving on to:
b) Then (and only then. Meaning that you must do a) above before you do this, part b)) please can you contact me in private on Google Hangouts: https://hangouts.google.com/chat/person/104217083390665628628 with* (as in- do not contact me without it because I will ignore you) the following info
1) The URL of this, your** thread (for my reference), and without which I cannot assist you,
2) The unique /channel/ URL (no other URL will do) of your YouTube channel (which, by the way, is: https://www.youtube.com/channel/UC5ouqw6hydKaGHWEGoaYieg
3) The email address you use for your hacked Google Account,
Full (URLs/email headers included) screen-grabs of the notifications Google would have sent you about the hacking,
4) Indication of any changes made by the hacker (videos uploaded, name/artwork changed etc)
5) An indication of when this happened, and-
confirm here if you can use the email in 3. above (if not- can you provide an alternative contact email, preferably one used by your Google Account in some way)
Once I have it, I will pass the info onto YouTube support. And, maybe YouTube support will be able to assist. Note the "maybe". Because there are no guarantees that the hijacking team will be able verify that hacking took place if there wasn't a hacking as such.
I, personally, wont be told much because it is obviously confidential to you, but I do suggest that you stand by in case they need more info and ask me/you directly. But, remember, they only can try to help you if you've done a) above.
c) Once you have regained control/access of your Google Account it is important/essential that you initiate two-step verification:https://www.google.com/landing/2step/ and get a decent virus detection/removal software for your devices to protect your Google Account in future. More here (and you really should read it): https://support.google.com/accounts/answer/46526
enjoyβ€οΈππ»
By Youtube Administration
β β β Uππ»βΊπ«Δπ¬πβ β β β
Google
Recover a hacked YouTube channel - YouTube Help
As a YouTube user, you invest a lot of time into your content and channels. We know it can be a stressful and difficult situation when your channel is hacked. Fortunately, there are steps that you can
Packages_that_actively_seeks_vulnerable_exploits_in_the_wild_More.pdf
499 KB
Packages that actively seeks vulnerable exploits in the wild. More of an umbrella group for similar packages.