CODING HACKING DEVELOPERS COLLEGE
6.14K subscribers
151 photos
8 videos
33 files
78 links
Disclaimer: This Channel is for educational purpose only , no one takes responsibility if you do anything wrong
𝙃𝙖𝙘𝙠 𝙏𝙝𝙚 𝙍𝙞𝙘𝙝💲= 𝙁𝙚𝙚𝙙 𝙏𝙝𝙚 𝙋𝙤𝙤𝙧🙌


FOUNDER:- @TeamVoiceContactBot
Download Telegram
🟢𝐀𝐫𝐭𝐢𝐜𝐥𝐞 11 = DOXING GUIDE

Doxing often involves hackers attempting to embarrass or shame individuals by publishing confidential information, images or videos obtained from their personal accounts. Initially, doxxing was used by hackers to "out" the identities of fellow bad actors/hackers. However, more recently, it has been used to attack users with opposing viewpoints.

https://t.me/PW_LECTURES_01
👍1
🟢𝐀𝐫𝐭𝐢𝐜𝐥𝐞 12 = Payment Bypass

Payment Bypass is a type of parameter tampering attack where the manipulation of parameters exchanged between client and server is done in order to modify application data, such as user price, the quantity of product, etc.

❤️‍🔥
https://t.me/PW_LECTURES_01
🟢𝐀𝐫𝐭𝐢𝐜𝐥𝐞 13 = WiFi Hacking with Fluxion

Fluxion is also capable to perform a Evil-Twin attack. In this attack technique we send de-authentication packets continuously to the target that all the client of target device will got disconnect and that time we create another WiFi with the same name and if clients thinks your WiFi as their original they got trapped and we got their credentials. Almost like phishing.
🟢𝐀𝐫𝐭𝐢𝐜𝐥𝐞 14 = SS7 ATTACK

The SS7 protocol facilitates interoperability between networks in 2G and 3G wireless communications. It supports the exchange of information needed to make and receive mobile phone calls and text messages, tracks billing information and enables smartphone users to roam while traveling.

https://t.me/PW_LECTURES_01
👍1
🟢𝐀𝐫𝐭𝐢𝐜𝐥𝐞 15 = Ghost Framework

Ghost Framework is an Android post-exploitation framework that uses an Android Debug Bridge to remotely access and control Android device. Ghost Framework 7.0 gives us the power and convenience of remote Android device administration.

https://t.me/PW_LECTURES_01
👍1
GUYS ‼️🔴 ATTENTION ‼️👇👇📢

BAR BAR COPYRIGHT AARHA HAI 💔.

⚡️SO WE HAD DECIDED THAT ABH NEW LECTURES YOUTUBE👇 PAR DALENGE👇👇👇👇. TAKI COPYRIGHT BHI KAM AAE OR APKA DATA BHI SAVE HO JAYE👇

https://youtube.com/channel/UCAtqNZPadl3cBItfPA4GbDA
https://youtube.com/channel/UCAtqNZPadl3cBItfPA4GbDA

🔴 SUBSCRIBE KAR LO❤️👍👆 SO YOU GET LECTURES NOW ON YOUTUBE 👍. SUBSCRIBE KAR LO TAKI NOTIFICATION MIL JAYE APKO NEW LECTURES KA.❤️👆
🟢𝐀𝐫𝐭𝐢𝐜𝐥𝐞 16 = PUA PUP VIRUS

Potentially Unwanted Applications (PUAs) are unwanted software programs that come bundled in legitimate free software programs as a package. These may also be called Potentially Unwanted Programs, or PUPs.
🟢𝐀𝐫𝐭𝐢𝐜𝐥𝐞 17 = RFI ATTACK

Remote file inclusion (RFI) is an attack targeting vulnerabilities in web applications that dynamically reference external scripts. The perpetrator's goal is to exploit the referencing function in an application to upload malware (e.g., backdoor shells) from a remote URL located within a different domain.
🟢𝐀𝐫𝐭𝐢𝐜𝐥𝐞 18 = TERMUX HACKING

Termux is a terminal emulator and Linux environment app for Android. It also doesn't require you to root your device.
🟢𝐀𝐫𝐭𝐢𝐜𝐥𝐞 19 = NGROK INSTALLATION

Ngrok provides a real-time web UI where you can introspect all HTTP traffic running over your tunnels. Replay any request against your tunnel with one click.
👍1
🟢𝐀𝐫𝐭𝐢𝐜𝐥𝐞 20 = PAYLOAD CREATION

Payload is malware that the threat actor intends to deliver to the victim. For example, if a cybercriminal sent out an email with a malicious Macro as the attachment and the victim gets infected with ransomware, then the ransomware is the payload (and not the email or document).
👍1
🔘🔘 HACKING/COMPUTER COURSES 🔘🔘


⛳️ FREE COURSES | π𝐭𝐡𝐨𝐧 CLICK HERE

⛳️ HACKING COURSES FREE CLICK HERE

⛳️ CODING COURSE FREE CLICK HERE

⛳️ BOOKS HACKING COURSES CLICK HERE
🟢𝐀𝐫𝐭𝐢𝐜𝐥𝐞 21 = PORT FORWARDING

Port forwarding allows remote computers (for example, computers on the Internet) to connect to a specific computer or service within a private local-area network (LAN).
👍1
🟢𝐀𝐫𝐭𝐢𝐜𝐥𝐞 22 = GOOGLE HACKING

Google hacking, also named Google dorking, is a hacker technique that uses Google Search and other Google applications to find security holes in the configuration and computer code that websites are using. Google dorking could also be used for OSINT.
🟢𝐀𝐫𝐭𝐢𝐜𝐥𝐞 23 = ABOUT TORRENTS

Torrent files are the files that are shared using the BitTorrent Protocol. This protocol is a technique for peer-to-peer sharing of files over the Internet. Usually, the files are scattered over a decentralized user network and are downloaded from there.
👍1
🟢𝐀𝐫𝐭𝐢𝐜𝐥𝐞 24 = ABOUT SDN

Software-Defined Networking (SDN) is a network architecture approach that enables the network to be intelligently and centrally controlled, or 'programmed,' using software applications.
🟢𝐀𝐫𝐭𝐢𝐜𝐥𝐞 25 = WAF BYPASS

Web application firewall (WAF) is a set of monitors and filters designed to detect and block network attacks on a web application. WAFs refer to the application layer of the OSI model. The web application firewall is used as a security tool. In real-time, it decides whether to grant or deny access.

❤️‍🔥
👍3
Many students confused how to open short links so watch this video carefully to know how to open links😉

https://youtube.com/shorts/HE38v2aEmjU?feature=share
https://youtube.com/shorts/HE38v2aEmjU?feature=share
👍1
🟢𝐀𝐫𝐭𝐢𝐜𝐥𝐞 26 = OS DESIGNING

Every OS can be made to perform well by using advanced compiler techniques, and if that fails then systematically breaking down component boundaries. Make it work, make it right, make it fast. Fast is last, always.
👍2