Happy_coding01
5.6K subscribers
109 photos
22 videos
17 files
254 links
๐Ÿ‡ฎ๐Ÿ‡ณ | Join us for the
๐Ÿ“š | Free Courses
๐Ÿ” | Cyber Security Course
๐Ÿ”“ | Ethical Hacking Course
๐Ÿ’ป | Web Development Course
๐ŸŒ | Programing Languages Course
๐Ÿ“ฑ | Android Pro Apk
Download Telegram
Media is too big
VIEW IN TELEGRAM
Tutorial to Creating a Free Remote Desktop Protocol (RDP)

๐Ÿ””Unmute Notification & Share Channel For More Content โœ…
๊งโ–ช๏ธ@CodingResourses เฟ
Media is too big
VIEW IN TELEGRAM
SSRF (Server-Side Request Forgery)

What is SSRF?

Server-side request forgery is a web security vulnerability that allows an attacker to cause the server-side application to make requests to an unintended location.
In a typical SSRF attack, the attacker might cause the server to make a connection to internal-only services within the organization's infrastructure. In other cases, they may be able to force the server to connect to arbitrary external systems. This could leak sensitive data, such as authorization credentials.

Labs: Click Here
Theory: Click Here

๐Ÿ””Unmute Notification & Share Channel For More Content โœ…
๊งโ–ช๏ธ@CodingResourses เฟ
Media is too big
VIEW IN TELEGRAM
โ€” A to Z About XSS โ€”

Overview: Cross-Site Scripting (XSS) attack are a type of injection,in which malicious scripts are injected into otherwise benign and trusted websites. XSS attacks occur when an attacker uses a web application to send malicious code, generally in the form of a browser side script, to a different end user. Flaws that allow these attacks to succeed are quite widespread and occur anywhere a web application uses input from a user within the output it generates without validating or encoding it.
An attacker can use XSS to send a malicious script to an unsuspecting user. The end userโ€™s browser has no way to know that the script should not be trusted, and will execute the script. Because it thinks the script came from a trusted source, the malicious script can access any cookies, session tokens, or other sensitive information retained by the browser and used with that site.

๐Ÿ””Unmute Notification & Share Channel For More Content โœ…
๊งโ–ช๏ธ@CodingResourses เฟ
Media is too big
VIEW IN TELEGRAM
โ€” Local File Inclusion โ€”

An attacker can use Local File Inclusion(LFI) to trick the web application into exposing or running files on the web server. An LFI attack may lead to information disclosure, remote code execution, or even Cross-site Scripting (XSS). Typically, LFI occurs when an application uses the path to a file as input. If the application treats this input as trusted, a local file may be used in the include statement.
Local File Inclusion is very similar to Remote File Inclusion (RFI). However, an attacker using LFI may only include local files (not remote files like in the case of RFI).

Theory: Click Here
Labs : Click Here

๐Ÿ””Unmute Notification & Share Channel For More Content โœ…
๊งโ–ช๏ธ@CodingResourses เฟ
Media is too big
VIEW IN TELEGRAM
Complete Cyber Security Networking

Topics:

โ€ข What is Computer Network
โ€ข What is WAN, WLAN, SAN, VPN & MAN
โ€ข What is Switch
โ€ข What is Router
โ€ข What is HUB
โ€ข Switch vs Router vs HUB
โ€ข What is Server & Client
โ€ข What is Access Point
โ€ข What is Network Operating System
โ€ข What is Protocol
โ€ข What is IP Address
โ€ข Explaining IPv4 & IPv6 in Detail
โ€ข What is MAC Address
โ€ข What is DNS Server
โ€ข What is Port
โ€ข What is ARP & RARP Requests
โ€ข What is Network Topology
โ€ข What is BUS & RING Topology
โ€ข What is STAR Topology
โ€ข What is MESH Topology
โ€ข What is TREE Topology

Get ready to boost your cyber security networking skills with us!

๐Ÿ””Unmute Notification & Share Channel For More Content โœ…
๊งโ–ช๏ธ@CodingResourses เฟ
Media is too big
VIEW IN TELEGRAM
Bug Bounty Hunting Full Course for Beginners

Language: Hindi

What is Bug Bounty Program ?

A bug bounty program, also known as a vulnerability rewards program (VRP), offers rewards to individuals for uncovering and reporting software bugs. As part of a vulnerability management strategy, these crowdsourcing initiatives are often used by companies to supplement penetration tests and internal code audits.

๐Ÿ””Unmute Notification & Share Channel For More Content โœ…
๊งโ–ช๏ธ@CodingResourses เฟ
๐Ÿ‘บAdd Custom theme to your Termux application ๐ŸŸฅ Cod3r-Ak - TermuX Custom ๐Ÿ‘บ

๐ŸŸขTermuX Custom is a GitHub repository designed to empower users to personalize their TermuX experience. With TermuX Custom, you can enhance your Termux interface with features like a customizable login screen, login sound effects, and the ability to change your shell name. The interactive terminal provides a dynamic environment for your TermuX


๐ŸŸขINSTALLATION:

๐ŸŸข pkg install git

๐ŸŸข git clone https://github.com/Cod3r-Ak/TermuX-Custom

๐ŸŸข cd TermuX-Custom

๐ŸŸข chmod +x *

๐ŸŸข bash setup.sh


โญ๏ธ ALL COMMANDS IN SINGLE LINE

โžก๏ธ apt update && apt upgrade && pkg install git && git clone https://github.com/Cod3r-Ak/TermuX-Custom && cd TermuX-Custom && chmod +x * && bash setup.sh

๐ŸŸชTermux tool is only for educational and experimental purpose. For more information about this tool, visit the GitHub link.๐ŸŸข

๐Ÿ””Unmute Notification & Share Channel For More Content โœ…
๊งโ–ช๏ธ@CodingResourses เฟ
๐Ÿช™ List of Cryptography Tools used in CTFs โ™พ


Decoder 1: www.dcode.fr/
symbols-ciphers

Decoder 2: cryptii.com

Dedcoder 3: gchq.github.io/CyberChef

Decoder 4: crackstation.net

Rot Decoder: theblob.org/rot.cgi

Twin Hex: www.calcresult.com/misc/cyphers/twin-hex.html

Hacking Learning Paid Private Channelโญ๏ธ dm @hitanshkadakia

๐Ÿ””Unmute Notification & Share Channel For More Content โœ…
๊งโ–ช๏ธ@CodingResourses เฟ
๐Ÿš€Instantly Withdraw $4.32
๐Ÿ’ฐYou can sell instantly

๐ŸŸขJoin: https://t.me/privateton_bot/start?startapp=ref_818598249

โž–Join Telegram
โž–Connect tonkeeper
โž–Do Refer and Withdraw

โŒ›Note: You Can sell Instantly After Withdraw,  and Withdraw also Instantly

#paidpromotion
Media is too big
VIEW IN TELEGRAM
๐Ÿ˜’ How To Hack Android Phone By Its IP Address Using Phone SpolitPro ๐Ÿ˜’

All The Requirements Are Given In The Video โœŒ๏ธ

๐Ÿ˜ˆ Commands For Linux

โžก๏ธ git clone https://github.com/AzeemIdrisi/PhoneSploit-Pro.git

โžก๏ธ cd PhoneSploit-Pro/

โžก๏ธ pip install -r requirements.txt

โžก๏ธ python3 phonesploitpro.py

๐Ÿ””Unmute Notification & Share Channel For More Content โœ…
๊งโ–ช๏ธ@CodingResourses เฟ