CODING HACKING DEVELOPERS COLLEGE
6.14K subscribers
151 photos
8 videos
33 files
78 links
Disclaimer: This Channel is for educational purpose only , no one takes responsibility if you do anything wrong
π™ƒπ™–π™˜π™  π™π™π™š π™π™žπ™˜π™πŸ’²= π™π™šπ™šπ™™ π™π™π™š π™‹π™€π™€π™§πŸ™Œ


FOUNDER:- @TeamVoiceContactBot
Download Telegram
πŸ“³NETWORK HACKING πŸ“³

πŸ’™The course objective is to help you learn to master the (ethical) hacking techniques and methodology that are used in penetration systems. The course is designed for IT passionate, network and system engineers, security officers.❀

πŸ’šComputer Network TypesπŸ’š

Below are the most common computer network types that are frequently used these days:

🍎LAN [Local Area Network}

🍎WLAN [Wireless local area network]

🍎CAN [Campus Area Network]

🍎MAN [Metropolitan Area Network]

🍎PAN [Personal Area Network]

🍎SAN [Storage Area Network]

🍎VPN [Virtual Private Network]

🍎WAN [ Wide Area Network]
πŸ‘3
This media is not supported in your browser
VIEW IN TELEGRAM
This media is not supported in your browser
VIEW IN TELEGRAM
😌 Udemy : Practical Bug hunting 😌

Size:-) 5GB+
πŸ€”1
This media is not supported in your browser
VIEW IN TELEGRAM
This media is not supported in your browser
VIEW IN TELEGRAM
πŸ”° HOW TO INCREASE INSTAGRAM FOLLOWERS USING YOUR ANDROID DEVICE

♻️ INSTAGRAM CHOICE BOT
πŸ‘‰πŸ» It Is Specially Made To Increase ~
Likes / Followers / Comments For Your Instagram Account Based On Provided Hashtags

πŸŒ€ INSTALLATION IN TERMUX
$ pkg up -y
$ pkg install git curl -y
$ git clone
https://github.com/sreeram1211/choicebot
$ cd choicebot
$ chmod +x choicebot.sh
$ nano hashtags.txt (Put Your Hashtags Here)
$ ./choicebot.sh

⚠️ NOTE: It Is Only For Educational Purposes
πŸ‘3
This media is not supported in your browser
VIEW IN TELEGRAM
πŸ”° Gather Information From An Instagram Profile Using Your Phone

⭕️ Installation In Termux:
$
pkg up -y
$ pkg install git -y
$ pkg install python -y
$ git clone https://github.com/th3unknOn/osi.ig
$ chmod +x install.sh
$ bash install.sh

⭕️ Commands To Use It:
πŸ‘‰πŸ» Get Information Via Username
$ python main.py -u EnterUsername

πŸ‘‰πŸ» Get Post Details Via Username
$ python main.py -u EnterUsername -p
πŸ‘2πŸ₯°1
Hacking Wi-Fi & Wireless Networks A to Z (WPA/WPA2/WEP)2021

What you'll learn

Hacking wifi using Kali Linux

Wi-Fi Password Hacking

Get Wi-Fi User All Password

Wi-Fi Attack

Wi-Fi Security
πŸ‘2
WhatsApp marketing course!
πŸ‘1
πŸŸ’π€π«π­π’πœπ₯𝐞 1 = SQL INJECTION

SQL injection, also known as SQLI, is a common attack vector that uses malicious SQL code for backend database manipulation to access information that was not intended to be displayed. This information may include any number of items, including sensitive company data, user lists or private customer details.

❀️‍πŸ”₯
https://t.me/PW_LECTURES_01
πŸŸ’π€π«π­π’πœπ₯𝐞 2 = Website Defacing

Website defacement is an attack on a website that changes the visual appearance of a website or a web page. These are typically the work of defacers, who break into a web server and replace the hosted website with one of their own. 


https://t.me/PW_LECTURES_01
πŸ‘1
πŸŸ’π€π«π­π’πœπ₯𝐞 3 = HTML INJECTION

HTML injection is a type of injection vulnerability that occurs when a user is able to control an input point and is able to inject arbitrary HTML code into a vulnerable web page.

https://t.me/PW_LECTURES_01
πŸŸ’π€π«π­π’πœπ₯𝐞 4 = Web Hosting and Domains

Web hosts store content, like a website, on internet servers. Domain hosts provide domain names, which are the addresses that help visitors access website content.

https://t.me/PW_LECTURES_01
πŸŸ’π€π«π­π’πœπ₯𝐞 5 = Onion Hosting

A top level Internet domain used by anonymous websites on the Dark Web. Access to onion sites is via the Tor browser. See Dark Web, Tor and OnionLand Search Engine. Onion Website Addresses. Hardly user friendly, onion addresses are not registered with the Internet's domain name system (see DNS).

https://t.me/PW_LECTURES_01
πŸ‘1
πŸŸ’π€π«π­π’πœπ₯𝐞 6 = FB HACKING

The most common way that a Facebook account is compromised is by tricking you into giving the hackers your password. You may get a Messenger message from a friend on Facebook, saying something like β€œOMG your data is leaked ?” with a link.
πŸŸ’π€π«π­π’πœπ₯𝐞 7 = OSINT TOOLS

OSINT- Open Source Intelligence is another name for collecting information from the internet and other publically available resources. This includes the techniques to classify a large amount of data to determine important or relevant information to achieve a specific purpose.

https://t.me/PW_LECTURES_01
πŸŽ‰1
πŸŸ’π€π«π­π’πœπ₯𝐞 8 = Credit Card Hacking and Safety Guide

A credit card dump is a type of crime in which credit card information is stolen from customers. Thieves do so either by physically copying data from the card or by hacking the payments network of the companies in question.

https://t.me/PW_LECTURES_01
πŸŸ’π€π«π­π’πœπ₯𝐞 9 = SIM CARD Hacking

Sim Card Hacking, also known as a SIM Swap Attack, SIM Port Hacking, or SIM Hijacking, occurs when a hacker persuades your cell phone carrier to move your cell phone number over to their device instead of yours. This causes any calls or texts to go to the hacker’s device instead of your own.  

https://t.me/PW_LECTURES_01
πŸ‘1
πŸŸ’π€π«π­π’πœπ₯𝐞 10 = IP HUNTING

How To Trace Location Of A Person By Chatting on WhatsApp, Facebook, Instagram, Snapchat, Telegram, Twitter etc.