πHacker Search Engines: Phone Numbers
πΉNumLookup - Free reverse phone lookup
πhttps://www.numlookup.com/
πΉ SpyDialer - Free Reverse Lookup Search
πhttps://spydialer.com/
πΉ WhitePages - Find people, contact info & background checks
πhttps://www.whitepages.com/
πΉ National Cellular Directory - Begin your comprehensive people search now
πhttps://www.nationalcellulardirectory.com/
πΉ Phone Validator - Is it a cell phone or is it a landline or is it a fake?
πhttps://www.phonevalidator.com/
πΉ Free Carrier Lookup - Enter a phone number and we'll return the carrier name
πhttps://freecarrierlookup.com/
πΉ RocketReach - Your first-degree connection to any professional
πhttps://rocketreach.co/
πΉ sync.me - Find out who called
πhttps://sync.me/
πΉ EmobileTracker - Track Mobile Owner Name, Location and Mobile Service Provider
πhttps://www.emobiletracker.com/
πΉ Reverse Phone Lookup - Find Out The Owner Of A Phone Number
πhttps://www.reversephonelookup.com/
πΉ ThatsThem - Reverse phone lookup
πhttps://thatsthem.com/reverse-phone-lookup
πΉ thisnumber.com - International Phone Directories
πhttps://www.thisnumber.com/
πΉ usphonebook.com - Free Reverse Phone Number Lookup
πhttps://www.usphonebook.com/
πΉ truepeoplesearch.com - Get current address, cell phone number, email address, relatives, friends and a lot more
πhttps://www.truepeoplesearch.com/#
πΉ Tellows - Who is calling? The phone number reverse search
πhttps://www.tellows.com/
πΉ SynapsInt - The unified OSINT research tool
πhttps://synapsint.com/
πΉ C99.nl - Over 57 quality API's and growing
πhttps://api.c99.nl/
πΉ ValidNumber.com - Free reverse phone lookup service to let you identify a caller associated with any 10-digit phone number from the US and Canada
πhttps://validnumber.com/
πΉ CellIdFinder - Nonprofit project wich helps you to find GSM BTS by MCC, MNC, LAC and CellID
πhttps://cellidfinder.com/
πΉ OldPhoneBook - Intantly search a large selection from the past 20 years of USA phone listings
πhttp://www.oldphonebook.com/
πΉ Spokeo - Search by name, phone, address, or email to confidentially lookup information about people you know
πhttps://www.spokeo.com/
πΉ Intelius Phone Lookup - Look up a phone number to find owner information, carrier details, and more
πhttps://www.intelius.com/reverse-phone-lookup/
πΉ ZabaSearch Phone Lookup - Reverse Phone Lookup Tool Can Uncover Personal Information, Social Media Data, Online Activity, Photos, and More
πhttps://www.zabasearch.com/reverse-phone-lookup/
πΉ AnyWho Phone Lookup - Find out information associated with a phone number
πhttps://www.anywho.com/reverse-phone-lookup/
πΉ Radaris Phone Lookup - Look up any phone number to see its owner and identify who's calling or texting you
πhttps://radaris.com/#findPhoneH
Join:π’@hacker_habeshaπͺπΉ
πΉNumLookup - Free reverse phone lookup
πhttps://www.numlookup.com/
πΉ SpyDialer - Free Reverse Lookup Search
πhttps://spydialer.com/
πΉ WhitePages - Find people, contact info & background checks
πhttps://www.whitepages.com/
πΉ National Cellular Directory - Begin your comprehensive people search now
πhttps://www.nationalcellulardirectory.com/
πΉ Phone Validator - Is it a cell phone or is it a landline or is it a fake?
πhttps://www.phonevalidator.com/
πΉ Free Carrier Lookup - Enter a phone number and we'll return the carrier name
πhttps://freecarrierlookup.com/
πΉ RocketReach - Your first-degree connection to any professional
πhttps://rocketreach.co/
πΉ sync.me - Find out who called
πhttps://sync.me/
πΉ EmobileTracker - Track Mobile Owner Name, Location and Mobile Service Provider
πhttps://www.emobiletracker.com/
πΉ Reverse Phone Lookup - Find Out The Owner Of A Phone Number
πhttps://www.reversephonelookup.com/
πΉ ThatsThem - Reverse phone lookup
πhttps://thatsthem.com/reverse-phone-lookup
πΉ thisnumber.com - International Phone Directories
πhttps://www.thisnumber.com/
πΉ usphonebook.com - Free Reverse Phone Number Lookup
πhttps://www.usphonebook.com/
πΉ truepeoplesearch.com - Get current address, cell phone number, email address, relatives, friends and a lot more
πhttps://www.truepeoplesearch.com/#
πΉ Tellows - Who is calling? The phone number reverse search
πhttps://www.tellows.com/
πΉ SynapsInt - The unified OSINT research tool
πhttps://synapsint.com/
πΉ C99.nl - Over 57 quality API's and growing
πhttps://api.c99.nl/
πΉ ValidNumber.com - Free reverse phone lookup service to let you identify a caller associated with any 10-digit phone number from the US and Canada
πhttps://validnumber.com/
πΉ CellIdFinder - Nonprofit project wich helps you to find GSM BTS by MCC, MNC, LAC and CellID
πhttps://cellidfinder.com/
πΉ OldPhoneBook - Intantly search a large selection from the past 20 years of USA phone listings
πhttp://www.oldphonebook.com/
πΉ Spokeo - Search by name, phone, address, or email to confidentially lookup information about people you know
πhttps://www.spokeo.com/
πΉ Intelius Phone Lookup - Look up a phone number to find owner information, carrier details, and more
πhttps://www.intelius.com/reverse-phone-lookup/
πΉ ZabaSearch Phone Lookup - Reverse Phone Lookup Tool Can Uncover Personal Information, Social Media Data, Online Activity, Photos, and More
πhttps://www.zabasearch.com/reverse-phone-lookup/
πΉ AnyWho Phone Lookup - Find out information associated with a phone number
πhttps://www.anywho.com/reverse-phone-lookup/
πΉ Radaris Phone Lookup - Look up any phone number to see its owner and identify who's calling or texting you
πhttps://radaris.com/#findPhoneH
Join:π’@hacker_habeshaπͺπΉ
NumLookup
Reverse Phone Lookup
Perform a free reverse phone lookup. Find full name, address, social media and more using a phone number. #1 Phone Number Lookup for US. Find out who called for free.
π4β€1π₯1
π¦ΆFoot Printing
πΉDomain Name
πΉIP Adress
πΉPhone Numbers
πΉEmail Address
πΉEmployees Information
πΉNamespaces
Join:π’@hacker_habeshaπͺπΉ
πΉDomain Name
πΉIP Adress
πΉPhone Numbers
πΉEmail Address
πΉEmployees Information
πΉNamespaces
Join:π’@hacker_habeshaπͺπΉ
β€3π1
Awesome Github Scripts & Tools | Part #1
Article : https://lnkd.in/d-JK8MMn
Join:π’@hacker_habeshaπͺπΉ
Article : https://lnkd.in/d-JK8MMn
Join:π’@hacker_habeshaπͺπΉ
π2β€1π₯1
π’βοΈCommon Types of Password Attacks
πΉBrute Force Attack
πΉDictionary Attack
πΉRainbow Table Attack
πΉSocial Engineering Attacks
πΉCredential Stuffing Attack
Join:π’@hacker_habeshaπͺπΉ
πΉBrute Force Attack
πΉDictionary Attack
πΉRainbow Table Attack
πΉSocial Engineering Attacks
πΉCredential Stuffing Attack
Join:π’@hacker_habeshaπͺπΉ
β€4π₯1π1
π’Common Types Of Wireless Attacks
πΉPacket Sniffing
πΉRogue Access Point
πΉJamming
πΉEvil Twin
πΉWar Driving
πΉBluejacking
πΉBluesnarfing
πΉWar Chalking
πΉWPS Attack
Join:π’@hacker_habeshaπͺπΉ
πΉPacket Sniffing
πΉRogue Access Point
πΉJamming
πΉEvil Twin
πΉWar Driving
πΉBluejacking
πΉBluesnarfing
πΉWar Chalking
πΉWPS Attack
Join:π’@hacker_habeshaπͺπΉ
π3π1
π§¬The DNS System Hierarchy
1οΈβ£Client
2οΈβ£DNS Cache
3οΈβ£DNS Resolver
4οΈβ£Root Server
5οΈβ£TLD Server
6οΈβ£Authoratative Server
Join:π’@hacker_habeshaπͺπΉ
1οΈβ£Client
2οΈβ£DNS Cache
3οΈβ£DNS Resolver
4οΈβ£Root Server
5οΈβ£TLD Server
6οΈβ£Authoratative Server
Join:π’@hacker_habeshaπͺπΉ
π₯°4β€1π₯1
πCreate a fake Access Point
πThink twice before connecting to a free public wireless hotspot at a coffee shop, airport or hotel. Ever wondered if the public Wi-Fi you just connected to is safe or if it could be an Evil Twin hotspot?
πhttps://en.iguru.gr/dimiourgiste-ena-pseftiko-access-point/
Join:π’@hacker_habeshaπͺπΉ
πThink twice before connecting to a free public wireless hotspot at a coffee shop, airport or hotel. Ever wondered if the public Wi-Fi you just connected to is safe or if it could be an Evil Twin hotspot?
πhttps://en.iguru.gr/dimiourgiste-ena-pseftiko-access-point/
Join:π’@hacker_habeshaπͺπΉ
β€2π1π₯°1
π£DDoS Tools
πΉAnevicon - Powerful UDP-based load generator, written in Rust.
πhttps://github.com/rozgo/anevicon
πΉD(HE)ater - D(HE)ater sends forged cryptographic handshake messages to enforce the Diffie-Hellman key exchange.
πhttps://github.com/Balasys/dheater
πΉHOIC - Updated version of Low Orbit Ion Cannon, has 'boosters' to get around common counter measures.
πhttps://sourceforge.net/projects/high-orbit-ion-cannon/
πΉLow Orbit Ion Canon (LOIC) - Open source network stress tool written for Windows.
πhttps://github.com/NewEraCracker/LOIC
πΉMemcrashed - DDoS attack tool for sending forged UDP packets to vulnerable Memcached servers obtained using Shodan API.
πhttps://github.com/649/Memcrashed-DDoS-Exploit
πΉSlowLoris - DoS tool that uses low bandwidth on the attacking side.
πhttps://github.com/gkbrk/slowloris
πΉT50 - Faster network stress tool.
πhttps://gitlab.com/fredericopissarra/t50/
πΉUFONet - Abuses OSI layer 7 HTTP to create/manage 'zombies' and to conduct different attacks using; GET/POST, multithreading, proxies, origin spoofing methods, cache evasion techniques, etc.
πhttps://github.com/epsylon/ufonet
Join:π’@hacker_habeshaπͺπΉ
πΉAnevicon - Powerful UDP-based load generator, written in Rust.
πhttps://github.com/rozgo/anevicon
πΉD(HE)ater - D(HE)ater sends forged cryptographic handshake messages to enforce the Diffie-Hellman key exchange.
πhttps://github.com/Balasys/dheater
πΉHOIC - Updated version of Low Orbit Ion Cannon, has 'boosters' to get around common counter measures.
πhttps://sourceforge.net/projects/high-orbit-ion-cannon/
πΉLow Orbit Ion Canon (LOIC) - Open source network stress tool written for Windows.
πhttps://github.com/NewEraCracker/LOIC
πΉMemcrashed - DDoS attack tool for sending forged UDP packets to vulnerable Memcached servers obtained using Shodan API.
πhttps://github.com/649/Memcrashed-DDoS-Exploit
πΉSlowLoris - DoS tool that uses low bandwidth on the attacking side.
πhttps://github.com/gkbrk/slowloris
πΉT50 - Faster network stress tool.
πhttps://gitlab.com/fredericopissarra/t50/
πΉUFONet - Abuses OSI layer 7 HTTP to create/manage 'zombies' and to conduct different attacks using; GET/POST, multithreading, proxies, origin spoofing methods, cache evasion techniques, etc.
πhttps://github.com/epsylon/ufonet
Join:π’@hacker_habeshaπͺπΉ
GitHub
GitHub - c0r0n3r/dheater: D(HE)ater is a proof of concept implementation of the D(HE)at attack (CVE-2002-20001) through whichβ¦
D(HE)ater is a proof of concept implementation of the D(HE)at attack (CVE-2002-20001) through which denial-of-service can be performed by enforcing the Diffie-Hellman key exchange. (read-only clon...
β€2π₯1π₯°1
β
HOW TO BYPASS OTP VERIFICATION
πBypass OTP verifications from Paypal, Instagram.. and many others, using a Discord Bot and telegram Bot or the private API.
π Tool List
πhttps://github.com/Oriyomi12/otp-bot
πhttps://github.com/jonahtanjz/OTP-Bot
πhttps://github.com/hahnavi/telbot-otp
πhttps://github.com/Master-Bruno/Hack-Telegram
πhttps://github.com/MR-ROGUE/anonymous_sms
πhttps://github.com/mddanish/Vulnerable-OTP-Application
πhttps://github.com/ghost-OTPBOT/ghost-OTPBOT.github.io
πhttps://github.com/GrabITOwner/GrabIT-OTPBOT
πhttps://github.com/CoinCeap/OTP-Bot-One-Time-Password-Verification-Bank-Paypal-Bypass-2-fa-main
Join:π’@hacker_habeshaπͺπΉ
πBypass OTP verifications from Paypal, Instagram.. and many others, using a Discord Bot and telegram Bot or the private API.
π Tool List
πhttps://github.com/Oriyomi12/otp-bot
πhttps://github.com/jonahtanjz/OTP-Bot
πhttps://github.com/hahnavi/telbot-otp
πhttps://github.com/Master-Bruno/Hack-Telegram
πhttps://github.com/MR-ROGUE/anonymous_sms
πhttps://github.com/mddanish/Vulnerable-OTP-Application
πhttps://github.com/ghost-OTPBOT/ghost-OTPBOT.github.io
πhttps://github.com/GrabITOwner/GrabIT-OTPBOT
πhttps://github.com/CoinCeap/OTP-Bot-One-Time-Password-Verification-Bank-Paypal-Bypass-2-fa-main
Join:π’@hacker_habeshaπͺπΉ
β€2π₯1π1
Here is another Training and Internship opportunity π Apply here ππ
https://nas.io/cybersecuredindia
https://nas.io/cybersecuredindia
π2π₯°1π1
πͺHTTP Cookie Explained
πΉWhat?
πΉHow it works?
πΉSet-Cookie
πΉCookie
πΉPurposes
Join:π’@hacker_habeshaπͺπΉ
πΉWhat?
πΉHow it works?
πΉSet-Cookie
πΉCookie
πΉPurposes
Join:π’@hacker_habeshaπͺπΉ
β€2π1π₯°1
πThe Ultimate SQLmap Tutorial: Master SQL Injection and Vulnerability Assessment!
πSQL Injection is a type of cyber attack where malicious actors exploit vulnerabilities in web applications to inject malicious SQL code into backend databases. This can lead to the exposure of sensitive data, unauthorized access to systems, and even complete system compromise.
SQLmap is a powerful open-source tool used to automate the process of detecting and exploiting SQL Injection vulnerabilities in web applications. It is a command-line tool that can be used to enumerate databases, extract data, and even execute operating system commands on the underlying system.
πhttps://en.hacks.gr/2023/12/15/the-ultimate-sqlmap-tutorial-master-sql-injection-and-vulnerability-assessment/
Join:π’@hacker_habeshaπͺπΉ
πSQL Injection is a type of cyber attack where malicious actors exploit vulnerabilities in web applications to inject malicious SQL code into backend databases. This can lead to the exposure of sensitive data, unauthorized access to systems, and even complete system compromise.
SQLmap is a powerful open-source tool used to automate the process of detecting and exploiting SQL Injection vulnerabilities in web applications. It is a command-line tool that can be used to enumerate databases, extract data, and even execute operating system commands on the underlying system.
πhttps://en.hacks.gr/2023/12/15/the-ultimate-sqlmap-tutorial-master-sql-injection-and-vulnerability-assessment/
Join:π’@hacker_habeshaπͺπΉ
β€2π₯1π1
π’WEB APPLICATION SECURITY TESTING COURSES
β«οΈWeb Application Security Testing Encoding, Filtering & Evasion Basics (4.36GB)
β«οΈWeb Application Penetration Testing File & Resource Attacks (4.61GB)
β«οΈWeb Application Security Testing Web Service Security Testing (3.37GB)
β«οΈWeb Application Security Testing Testing for Common Attacks (3.23GB)
β«οΈWeb Application Security Testing CMS Security Testing (6.31GB)
πhttps://mega.nz/folder/byp2CIra#Jvj3A1qZCgUFeawGL_3Wxg
Join:π’@hacker_habeshaπͺπΉ
β«οΈWeb Application Security Testing Encoding, Filtering & Evasion Basics (4.36GB)
β«οΈWeb Application Penetration Testing File & Resource Attacks (4.61GB)
β«οΈWeb Application Security Testing Web Service Security Testing (3.37GB)
β«οΈWeb Application Security Testing Testing for Common Attacks (3.23GB)
β«οΈWeb Application Security Testing CMS Security Testing (6.31GB)
πhttps://mega.nz/folder/byp2CIra#Jvj3A1qZCgUFeawGL_3Wxg
Join:π’@hacker_habeshaπͺπΉ
π2β€1π₯°1
π’β‘Automatic Vulnerability Scanning for APIs Using OWASP ZAP (crAPI as an exmaple)
π΅οΈVulnerability Scanning is the technique with which we will try to find vulnerabilities in the system and/or web application, API, Mobile App, using some sort of an automated scanner to get security misconfigurations.
βοΈthere are many vulnerability scanners that are great tools to pentesters. Such as Acunetix, Netsparker, Nessus, Openvas, Burp Suite Professional, etc. But in this article we will be using the free and opensource OWASP ZAP as our Vulnerability Scanner.
βοΈAPIs are a bit different than normal Web Applications and sometimes using Automated tools like Nikto wonβt show us any good results.
πhttps://en.hacks.gr/2023/12/15/automatic-vulnerability-scanning-for-apis-using-owasp-zap-crapi-as-an-exmaple/
Join:π’@hacker_habeshaπͺπΉ
π΅οΈVulnerability Scanning is the technique with which we will try to find vulnerabilities in the system and/or web application, API, Mobile App, using some sort of an automated scanner to get security misconfigurations.
βοΈthere are many vulnerability scanners that are great tools to pentesters. Such as Acunetix, Netsparker, Nessus, Openvas, Burp Suite Professional, etc. But in this article we will be using the free and opensource OWASP ZAP as our Vulnerability Scanner.
βοΈAPIs are a bit different than normal Web Applications and sometimes using Automated tools like Nikto wonβt show us any good results.
πhttps://en.hacks.gr/2023/12/15/automatic-vulnerability-scanning-for-apis-using-owasp-zap-crapi-as-an-exmaple/
Join:π’@hacker_habeshaπͺπΉ
π2β€1π€©1
βVirtual Host Enumeration for Uncovering Hidden Subdomains
πTools and Techniques for efficient virtual host discovery
πhttps://en.hacks.gr/2023/12/12/virtual-host-enumeration-for-uncovering-hidden-subdomains/
Join:π’@hacker_habeshaπͺπΉ
πTools and Techniques for efficient virtual host discovery
πhttps://en.hacks.gr/2023/12/12/virtual-host-enumeration-for-uncovering-hidden-subdomains/
Join:π’@hacker_habeshaπͺπΉ
π5β€1π1