π’"Stay connected on our Telegram channel for the latest updates and exclusive content. Thank you for your support!π
π₯°2β€1π1
π’α₯α
α α α£α α αα Websites α Ethical Hackers
πFile Upload
https://anonfiles.com/
https://mega.co.nz/
https://www.mediafire.com/
https://infotomb.com/m/welcome
http://sharesend.com/
http://www.wss-coding.com/upload
https://thestarkarmyx.t.me/
http://zippyshare.com/
http://filetolink.com/
http://ge.tt/
http://largedocument.com/
http://rghost.net/
http://dox.abv.bg/files/share
http://secureupload.eu/
πEncrypt / Decrypt
http://crypo.in.ua/tools/
http://www.tools4noobs.com/online_tools/decrypt/
http://codebeautify.org/encrypt-decrypt
http://textmechanic.com/Encryption-Generator.html
http://www.yellowpipe.com/yis/tools/encrypter/
π‘IP Lookup
http://ip-api.com/#
http://www.my-ip-neighbors.com/
http://www.whatismyip.com/
http://www.ip2location.com/demo
http://freegeoip.net/static/index.html
http://whatstheirip.com
http://ipaddress.com
http://www.ip-adress.com/ipaddresstolocation/
πNetwork Online Tools
http://www.yougetsignal.com/
http://www.dnswatch.info/
http://www.nirsoft.net/countryip/
http://www.tcpiputils.com/
http://www.coffer.com/mac_find/
http://bgp.he.net/
http://www.sockets.com/services.htm
http://services.ce3c.be/ciprg/
π₯·Not distribute to AV
http://v2.scan.majyx.net/?page=home
http://fuckingscan.me/
https://anonscanner.com/
http://nodistribute.com/
http://www.file2scan.net/
πVirus Scan
https://www.virustotal.com/nl/
http://anubis.iseclab.org/
http://virusscan.jotti.org/it
π©ΈVulnerabilities Database
https://cve.mitre.org/cve/
http://www.cvedetails.com/
https://nvd.nist.gov/
http://osvdb.org/
https://www.kb.cert.org/vuls/
https://secunia.com/community/advisories/search/
http://www.securityfocus.com/bid
http://lwn.net/Vulnerabilities/
http://denimgroup.com/resources-threadfix/
http://www.vulnerability-lab.com
http://www.secdocs.org/
π·Exploits Database
http://www.exploit-db.com/
http://www.intelligentexploit.com
http://www.shodanhq.com/
http://packetstormsecurity.com/
Join us π@hacker_habeshaπͺπΉ
π@hacker_habeshaπͺπΉ
πFile Upload
https://anonfiles.com/
https://mega.co.nz/
https://www.mediafire.com/
https://infotomb.com/m/welcome
http://sharesend.com/
http://www.wss-coding.com/upload
https://thestarkarmyx.t.me/
http://zippyshare.com/
http://filetolink.com/
http://ge.tt/
http://largedocument.com/
http://rghost.net/
http://dox.abv.bg/files/share
http://secureupload.eu/
πEncrypt / Decrypt
http://crypo.in.ua/tools/
http://www.tools4noobs.com/online_tools/decrypt/
http://codebeautify.org/encrypt-decrypt
http://textmechanic.com/Encryption-Generator.html
http://www.yellowpipe.com/yis/tools/encrypter/
π‘IP Lookup
http://ip-api.com/#
http://www.my-ip-neighbors.com/
http://www.whatismyip.com/
http://www.ip2location.com/demo
http://freegeoip.net/static/index.html
http://whatstheirip.com
http://ipaddress.com
http://www.ip-adress.com/ipaddresstolocation/
πNetwork Online Tools
http://www.yougetsignal.com/
http://www.dnswatch.info/
http://www.nirsoft.net/countryip/
http://www.tcpiputils.com/
http://www.coffer.com/mac_find/
http://bgp.he.net/
http://www.sockets.com/services.htm
http://services.ce3c.be/ciprg/
π₯·Not distribute to AV
http://v2.scan.majyx.net/?page=home
http://fuckingscan.me/
https://anonscanner.com/
http://nodistribute.com/
http://www.file2scan.net/
πVirus Scan
https://www.virustotal.com/nl/
http://anubis.iseclab.org/
http://virusscan.jotti.org/it
π©ΈVulnerabilities Database
https://cve.mitre.org/cve/
http://www.cvedetails.com/
https://nvd.nist.gov/
http://osvdb.org/
https://www.kb.cert.org/vuls/
https://secunia.com/community/advisories/search/
http://www.securityfocus.com/bid
http://lwn.net/Vulnerabilities/
http://denimgroup.com/resources-threadfix/
http://www.vulnerability-lab.com
http://www.secdocs.org/
π·Exploits Database
http://www.exploit-db.com/
http://www.intelligentexploit.com
http://www.shodanhq.com/
http://packetstormsecurity.com/
Join us π@hacker_habeshaπͺπΉ
π@hacker_habeshaπͺπΉ
π₯2β€1π₯°1
π²Here are Mobile device hacking materials
π@hacker_habeshaπͺπΉ
ππππππππ
π@hacker_habeshaπͺπΉ
ππππππππ
π₯°3π2
βοΈCollaboration Hacking Tools
πΉDradis - Open-source reporting and collaboration tool for IT security professionals.
πhttps://dradisframework.com/
πΉHexway Hive - Commercial collaboration, data aggregation, and reporting framework for red teams with a limited free self-hostable option.
πhttps://hexway.io/hive/
πΉLair - Reactive attack collaboration framework and web application built with meteor.
πhttps://github.com/lair-framework/lair/wiki
πΉPentest Collaboration Framework (PCF) - Open source, cross-platform, and portable toolkit for automating routine pentest processes with a team.
πhttps://gitlab.com/invuls/pentest-projects/pcf
πΉReconmap - Open-source collaboration platform for InfoSec professionals that streamlines the pentest process.
πhttps://reconmap.com/
πΉRedELK - Track and alarm about Blue Team activities while providing better usability in long term offensive operations.
πhttps://github.com/outflanknl/RedELK
π#infosec #cybersecurity #hacking #pentesting #security #Ethiopian ethical hacker #habesha hacker
π π π π π π π π π π π π
Join ππ
π@hacker_habeshaπͺπΉ π
π@hacker_habeshaπͺπΉ π
πΉDradis - Open-source reporting and collaboration tool for IT security professionals.
πhttps://dradisframework.com/
πΉHexway Hive - Commercial collaboration, data aggregation, and reporting framework for red teams with a limited free self-hostable option.
πhttps://hexway.io/hive/
πΉLair - Reactive attack collaboration framework and web application built with meteor.
πhttps://github.com/lair-framework/lair/wiki
πΉPentest Collaboration Framework (PCF) - Open source, cross-platform, and portable toolkit for automating routine pentest processes with a team.
πhttps://gitlab.com/invuls/pentest-projects/pcf
πΉReconmap - Open-source collaboration platform for InfoSec professionals that streamlines the pentest process.
πhttps://reconmap.com/
πΉRedELK - Track and alarm about Blue Team activities while providing better usability in long term offensive operations.
πhttps://github.com/outflanknl/RedELK
π#infosec #cybersecurity #hacking #pentesting #security #Ethiopian ethical hacker #habesha hacker
π π π π π π π π π π π π
Join ππ
π@hacker_habeshaπͺπΉ π
π@hacker_habeshaπͺπΉ π
β€2π±1π1
π’Hacker Search Engines: Images
πΉ Google Image Search - The most comprehensive image search on the web
πhttps://images.google.com/
πΉ Baidu Image - Baidu Image Search
πhttps://image.baidu.com/
πΉ Yahoo Image - Yahoo Image Search
πhttps://images.search.yahoo.com/
πΉ Yandex Image - Yandex Image Search
πhttps://www.yandex.com/images/
πΉ Facecheck.id - Search for people by photo and verify you are talking to the person they claim to be
πhttps://facecheck.id/
πΉ Bing Visual Search - See it, search it
πhttps://www.bing.com/visualsearch
πΉ Reverse Image Search - Super-fast image finder that helps you find similar images online
πhttps://www.reverseimagesearch.org/
πΉ Reverse Image - Find Where Images Appear Online
πhttps://reverseimage.net/
πΉ Pixsy - Find and fight image theft
πhttps://www.pixsy.com/
πΉ Pimeyes - Face Search Engine, Reverse Image Search
πhttps://pimeyes.com/
πΉ Pictriev - Find look-alike celebrities on the web using the face recognition
πhttp://www.pictriev.com/
πΉ Karmadecay - Reverse image search of Reddit.com
πhttp://karmadecay.com/
πΉ Infringement Report - The web's best image copyright infringement search tool
πhttps://infringement.report/
πΉTineye - Image search and recognition company
πhttps://tineye.com/
πΉ Flickr - Home to tens of billions of photos and 2 million groups
πhttps://flickr.com/search/
πΉ Sogou - Chinese technology company that offers a search engine
πhttps://pic.sogou.com/
πΉJimpl - Online photo metadata and EXIF data viewer
πhttps://jimpl.com/
πΉ Same Energy - Find beautiful images
πhttps://same.energy/
πΉ FotoForensics - Tools and training for digital picture analysis, including error level analysis, metadata, and tutorials
πhttps://fotoforensics.com/
πΉ Exif data - Online application that lets you take a deeper look at your favorite images
πhttp://exifdata.com/
πΉ Image Identify - Image recognition site, just drag your image & identify
πhttps://www.imageidentify.com/
Join: πππππππππ
π―π―π―π―π―π―π―π―π―π―π―π―
π―π@hacker_habeshaπͺπΉ π―
π― π@hacker_habeshaπͺπΉ π―
π―π―π―π―π―π―π―π―π―π―π―π―
πΉ Google Image Search - The most comprehensive image search on the web
πhttps://images.google.com/
πΉ Baidu Image - Baidu Image Search
πhttps://image.baidu.com/
πΉ Yahoo Image - Yahoo Image Search
πhttps://images.search.yahoo.com/
πΉ Yandex Image - Yandex Image Search
πhttps://www.yandex.com/images/
πΉ Facecheck.id - Search for people by photo and verify you are talking to the person they claim to be
πhttps://facecheck.id/
πΉ Bing Visual Search - See it, search it
πhttps://www.bing.com/visualsearch
πΉ Reverse Image Search - Super-fast image finder that helps you find similar images online
πhttps://www.reverseimagesearch.org/
πΉ Reverse Image - Find Where Images Appear Online
πhttps://reverseimage.net/
πΉ Pixsy - Find and fight image theft
πhttps://www.pixsy.com/
πΉ Pimeyes - Face Search Engine, Reverse Image Search
πhttps://pimeyes.com/
πΉ Pictriev - Find look-alike celebrities on the web using the face recognition
πhttp://www.pictriev.com/
πΉ Karmadecay - Reverse image search of Reddit.com
πhttp://karmadecay.com/
πΉ Infringement Report - The web's best image copyright infringement search tool
πhttps://infringement.report/
πΉTineye - Image search and recognition company
πhttps://tineye.com/
πΉ Flickr - Home to tens of billions of photos and 2 million groups
πhttps://flickr.com/search/
πΉ Sogou - Chinese technology company that offers a search engine
πhttps://pic.sogou.com/
πΉJimpl - Online photo metadata and EXIF data viewer
πhttps://jimpl.com/
πΉ Same Energy - Find beautiful images
πhttps://same.energy/
πΉ FotoForensics - Tools and training for digital picture analysis, including error level analysis, metadata, and tutorials
πhttps://fotoforensics.com/
πΉ Exif data - Online application that lets you take a deeper look at your favorite images
πhttp://exifdata.com/
πΉ Image Identify - Image recognition site, just drag your image & identify
πhttps://www.imageidentify.com/
Join: πππππππππ
π―π―π―π―π―π―π―π―π―π―π―π―
π―π@hacker_habeshaπͺπΉ π―
π― π@hacker_habeshaπͺπΉ π―
π―π―π―π―π―π―π―π―π―π―π―π―
β€2π2π1
This media is not supported in your browser
VIEW IN TELEGRAM
π€©2β€1π€1
π₯Cybersecurity Tools By Category
πΊInformation Gathering:
πΉNmap
πΉShodan
πΉMaltego
πΉTheHavester
πΉRecon-NG
πΉAmass
πΉCensys
πΉOSINT Framework
πΉGobuster
πΊExploitation:
πΉBurp Suite
πΉMetasploit Framework
πΉSQL Map
πΉZAP
πΉExploitDB
πΉCore Impact
πΉCobalt Strike
πΊPassword Cracking:
πΉJohn The Ripper
πΉHydra
πΉHashcat
πΉOPHCrack
πΉMedusa
πΉTHC-Hydra
πΉCain & Abel
πΊVulnerability Scanning:
πΉOpenVAS
πΉNessus
πΉAppScan
πΉLYNIS
πΉRetina
πΉNexpose
πΉInvicti
πΉAcunetix
πΊSoftware Engineering:
πΉGoPhish
πΉHiddenEye
πΉSocialFish
πΉEvilURL
πΉEvilginx
πΉSET
πΊForensics:
πΉSluethKit
πΉAutopsy
πΉVolatility
πΉGuymager
πΉForemost
πΉBinwalk
πΉWireshark
πΊWireless Hacking:
πΉAircrack-NG
πΉWifite
πΉKismet
πΉTCPDump
πΉAirsnort
πΉNetstumbler
πΉReaver
πΉAirgeddon
πΊWeb Application Assessment:
πΉOWASP ZAP
πΉBurp Suite
πΉNikto
πΉZAP
πΉWPScan
πΉGobuster
πΉApp Spider
π@hacker_habeshaπͺπΉ
πΊInformation Gathering:
πΉNmap
πΉShodan
πΉMaltego
πΉTheHavester
πΉRecon-NG
πΉAmass
πΉCensys
πΉOSINT Framework
πΉGobuster
πΊExploitation:
πΉBurp Suite
πΉMetasploit Framework
πΉSQL Map
πΉZAP
πΉExploitDB
πΉCore Impact
πΉCobalt Strike
πΊPassword Cracking:
πΉJohn The Ripper
πΉHydra
πΉHashcat
πΉOPHCrack
πΉMedusa
πΉTHC-Hydra
πΉCain & Abel
πΊVulnerability Scanning:
πΉOpenVAS
πΉNessus
πΉAppScan
πΉLYNIS
πΉRetina
πΉNexpose
πΉInvicti
πΉAcunetix
πΊSoftware Engineering:
πΉGoPhish
πΉHiddenEye
πΉSocialFish
πΉEvilURL
πΉEvilginx
πΉSET
πΊForensics:
πΉSluethKit
πΉAutopsy
πΉVolatility
πΉGuymager
πΉForemost
πΉBinwalk
πΉWireshark
πΊWireless Hacking:
πΉAircrack-NG
πΉWifite
πΉKismet
πΉTCPDump
πΉAirsnort
πΉNetstumbler
πΉReaver
πΉAirgeddon
πΊWeb Application Assessment:
πΉOWASP ZAP
πΉBurp Suite
πΉNikto
πΉZAP
πΉWPScan
πΉGobuster
πΉApp Spider
π@hacker_habeshaπͺπΉ
π₯2β€1π1
π’Capture the flag (CTF) 2023 π’
Gain hands-on experience and develop practical skills in cybersecurity.
1) Aupctf
aupctf.live
2) Altayctf
altayctf.ru
3) BSIDESTLV
lnkd.in/dtjd2R8Z
4) CTF HackTheBox
lnkd.in/d53zw96M
5) Zer0pts
lnkd.in/dD7DvSZC
6) AmateusCTF
ctf.amateurs.team
7) CryptoCTF
cr.yp.toc.tf
8) Cybersecurity Rumble
lnkd.in/dJQy7dRB
9) Hitcon CTF
ctf.hitcon.org
10) SecconCTF
lnkd.in/dxtgqQMh
11) PingCTF
ctf.knping.pl
12) Hack.lu CTF
flu.xxx
13) CakeCTF
cakectf.com
14) Escape CTF
ctf.t3n4ci0us.kr
15) PatriotCTF
lnkd.in/dJbEjH3g
16) ASIS CTF 2023
asisctf.com
17) DeadFace CTF
ctf.deadface.io
18) Hacker101 CTF
ctf.hacker101.com
19) PicoCTF
picoctf.org
20) RingerZer0CTF
ringzer0ctf.com
21) SANS Netwars
lnkd.in/d-fiSVym
Join ππ£@hacker_habeshaπͺπΉ
Gain hands-on experience and develop practical skills in cybersecurity.
1) Aupctf
aupctf.live
2) Altayctf
altayctf.ru
3) BSIDESTLV
lnkd.in/dtjd2R8Z
4) CTF HackTheBox
lnkd.in/d53zw96M
5) Zer0pts
lnkd.in/dD7DvSZC
6) AmateusCTF
ctf.amateurs.team
7) CryptoCTF
cr.yp.toc.tf
8) Cybersecurity Rumble
lnkd.in/dJQy7dRB
9) Hitcon CTF
ctf.hitcon.org
10) SecconCTF
lnkd.in/dxtgqQMh
11) PingCTF
ctf.knping.pl
12) Hack.lu CTF
flu.xxx
13) CakeCTF
cakectf.com
14) Escape CTF
ctf.t3n4ci0us.kr
15) PatriotCTF
lnkd.in/dJbEjH3g
16) ASIS CTF 2023
asisctf.com
17) DeadFace CTF
ctf.deadface.io
18) Hacker101 CTF
ctf.hacker101.com
19) PicoCTF
picoctf.org
20) RingerZer0CTF
ringzer0ctf.com
21) SANS Netwars
lnkd.in/d-fiSVym
Join ππ£@hacker_habeshaπͺπΉ
π₯°3β€1π€©1
π΄α αα£α α¨αα αα
ααα΅ α₯αα
αα₯αα΅
Anonymous Poll
17%
Cyber security
34%
Programing/coding
38%
Hacking
11%
Networking
π₯°3β€1π1π¨βπ»1
π’Best mobile device / Android hacking books you should read
πΉTouch MEπ₯°
π@hacker_habeshaπͺπΉ
πΉTouch MEπ₯°
π@hacker_habeshaπͺπΉ
π₯3β€1π1
π’α α α¨α°α£α α¨ Hacking αα
ααα΅ α₯α cheat sheet α₯αα πππ ααα₯ α¨αα£α₯α α¨αααα΅ ααα α°ααα (Here are collection of Hacking Books and cheat sheet !. "Be a part of the solution, not the problem - hack ethically."
Enjoy reading and practising them) π₯³π Join π@hacker_habeshaπͺπΉ
π£Part 01 π£Part 11
π£Part 02 π£Part 12
π£Part 03 π£Part 13
π£Part 04 π£Part 14
π£Part 05 π£Part 15
π£Part 06 π£Part 16
π£Part 07
π£Part 08
π£Part 09
π£Part 10
Enjoy reading and practising them) π₯³π Join π@hacker_habeshaπͺπΉ
π£Part 01 π£Part 11
π£Part 02 π£Part 12
π£Part 03 π£Part 13
π£Part 04 π£Part 14
π£Part 05 π£Part 15
π£Part 06 π£Part 16
π£Part 07
π£Part 08
π£Part 09
π£Part 10
β€3π₯°2π1π1
π₯°2β€1
π’ROADMAP TO BECOME A HACKER (AN ETHICAL HACKER)π’
πΉStep 1 - Get hands on Linux/Unix => LINUX/UNIX is an open-source operating system that provides better security to the computer systems. As a hacker, there is no skipping LINUX because it is one of the most used OS for hacking and provides ample tools for hackers. Some of the common Linux distributions are, Red Hat Linux, Kali Linux, Ubuntu, BackTrack, etc. Kali Linux is one of the most used Linux systems and is specially customized for hacking.
πΉStep 2 - Learn simple Programing language => start with learning python or C . Although it's not so important but its comes handy And let you use your brain more .
πΉStep 3 - Learn networking concepts => You should have a knowledge of various networks, protocols since it is beneficial in exploiting vulnerabilities. Thus learning various networking concepts and various networking tools such as Wireshark, Nmap, etc will be really beneficial. Trust me, Hacking is all about playing around the Network
πΉStep 4 - Learn how to be Anonymous => As a hacker, this is one of the important steps that one should know. As a hacker, you might do a lot of this, some might be legal, some might be without permission. Thus it is necessary to know how to be anonymous and how one can hide their identity online, So that there will be one trace left and no one can backtrace you.
πΉStep 5 - Explore the hidden web => The dark web is part of the internet that isn't visible to search engines and requires the use of an anonymizing browser called Tor, etc to be accessed.
You've no doubt heard talk of the βdark webβ as a hotbed of criminal activity β and it is. But not everything is illegal, the dark web also has a legitimate side. Thus it is necessary to know a bit about what it is and how it works.
πΉStep 6 - don't forget about cryptography =>Cryptography, also called the art of secret writing, It is something that as a hacker you should master. Encryption and Decryption are important skills in hacking. Encryption is widely used in several aspects of information security in authentication, confidentiality, and integrity of the data. Information on a network is always encrypted such as passwords, packets sent over the network, etc. Thus, as a hacker, it is necessary to identify the encryption and break it.
πΉStep 7 - Dive Deep into Hacking => Once you have good knowledge about the topics discussed thus far, it's time to dive deep. Trying diving deep into hacking concepts and learning topics such as vulnerability assessment, penetration testing, SQL injections, and much more. In the field of hacking, learning is never-ending because security changes every day with new updates in the system.Thus you need to be updated with the latest tools and ways to crack a system or secure a system.
πΉStep 8 - Experimenting and Practicing is the Key => After learning some concepts, sit back and nail them. Keep practicing them in various environments and various scenarios. Set up your own lab for experiment purposes. Use these labs to test various tools, attacks, and much more.
πΉStep 9 - Keep discussing things with Elite Hackers => join us on discord and telegram that will help you to join discussions with other hackers in the world. This will help in exchange and sharing of knowledge and work as a team.
Last step but most important one => This is not one week or year process there is no limit of learning so keep patient & keep learning
βοΈThere is very thin line to between Ethical or Unethical actions. With great power comes great responsibility.βοΈ
π£ALL THE BEST FOR YOUR JOURNEY π£
π’@hacker_habeshaπ’
πΉStep 1 - Get hands on Linux/Unix => LINUX/UNIX is an open-source operating system that provides better security to the computer systems. As a hacker, there is no skipping LINUX because it is one of the most used OS for hacking and provides ample tools for hackers. Some of the common Linux distributions are, Red Hat Linux, Kali Linux, Ubuntu, BackTrack, etc. Kali Linux is one of the most used Linux systems and is specially customized for hacking.
πΉStep 2 - Learn simple Programing language => start with learning python or C . Although it's not so important but its comes handy And let you use your brain more .
πΉStep 3 - Learn networking concepts => You should have a knowledge of various networks, protocols since it is beneficial in exploiting vulnerabilities. Thus learning various networking concepts and various networking tools such as Wireshark, Nmap, etc will be really beneficial. Trust me, Hacking is all about playing around the Network
πΉStep 4 - Learn how to be Anonymous => As a hacker, this is one of the important steps that one should know. As a hacker, you might do a lot of this, some might be legal, some might be without permission. Thus it is necessary to know how to be anonymous and how one can hide their identity online, So that there will be one trace left and no one can backtrace you.
πΉStep 5 - Explore the hidden web => The dark web is part of the internet that isn't visible to search engines and requires the use of an anonymizing browser called Tor, etc to be accessed.
You've no doubt heard talk of the βdark webβ as a hotbed of criminal activity β and it is. But not everything is illegal, the dark web also has a legitimate side. Thus it is necessary to know a bit about what it is and how it works.
πΉStep 6 - don't forget about cryptography =>Cryptography, also called the art of secret writing, It is something that as a hacker you should master. Encryption and Decryption are important skills in hacking. Encryption is widely used in several aspects of information security in authentication, confidentiality, and integrity of the data. Information on a network is always encrypted such as passwords, packets sent over the network, etc. Thus, as a hacker, it is necessary to identify the encryption and break it.
πΉStep 7 - Dive Deep into Hacking => Once you have good knowledge about the topics discussed thus far, it's time to dive deep. Trying diving deep into hacking concepts and learning topics such as vulnerability assessment, penetration testing, SQL injections, and much more. In the field of hacking, learning is never-ending because security changes every day with new updates in the system.Thus you need to be updated with the latest tools and ways to crack a system or secure a system.
πΉStep 8 - Experimenting and Practicing is the Key => After learning some concepts, sit back and nail them. Keep practicing them in various environments and various scenarios. Set up your own lab for experiment purposes. Use these labs to test various tools, attacks, and much more.
πΉStep 9 - Keep discussing things with Elite Hackers => join us on discord and telegram that will help you to join discussions with other hackers in the world. This will help in exchange and sharing of knowledge and work as a team.
Last step but most important one => This is not one week or year process there is no limit of learning so keep patient & keep learning
βοΈThere is very thin line to between Ethical or Unethical actions. With great power comes great responsibility.βοΈ
π£ALL THE BEST FOR YOUR JOURNEY π£
π’@hacker_habeshaπ’
π2π₯°2π1π1
π’Fileless Malware, an Invisible threat
πFileless malware refers to a special type of cyber attack that can infect a system with malware without leaving an executable file on disk.
1. Youβre browsing the web
2. You visit a site that happens to be hosting an exploit kit
3. The exploit kit scans your browser for outdated plugins such as Flash, Adobe, Java or Microsoft Silverlight
4. The exploit kit attempts to exploit vulnerabilities in the outdated plugin
5. If successful, the exploit kit starts running the payload in the memory of your browser process.
6. The infection is successful!
π’@hacker_habeshaπ΄
πFileless malware refers to a special type of cyber attack that can infect a system with malware without leaving an executable file on disk.
1. Youβre browsing the web
2. You visit a site that happens to be hosting an exploit kit
3. The exploit kit scans your browser for outdated plugins such as Flash, Adobe, Java or Microsoft Silverlight
4. The exploit kit attempts to exploit vulnerabilities in the outdated plugin
5. If successful, the exploit kit starts running the payload in the memory of your browser process.
6. The infection is successful!
π’@hacker_habeshaπ΄
β€2π1π₯1π₯°1
π’Awesome GPTs (Agents) for Cybersecurity
πThe "Awesome GPTs (Agents) Repo" represents an initial effort to compile a comprehensive list of GPT agents focused on cybersecurity (offensive and defensive), created by the community.
π’@hacker_habeshaπ΄
πThe "Awesome GPTs (Agents) Repo" represents an initial effort to compile a comprehensive list of GPT agents focused on cybersecurity (offensive and defensive), created by the community.
π’@hacker_habeshaπ΄
π₯2β€1π₯°1
π’Collection of the best Networking Books for hackers and cybersecurity enthusiasts.
π’@hacker_habeshaπ΄
π’@hacker_habeshaπ΄
β€2π₯1π₯°1