Media is too big
VIEW IN TELEGRAM
Tutorial to Creating a Free Remote Desktop Protocol (RDP)
๐Unmute Notification & Share Channel For More Content โ
๊งโช๏ธ@CodingResourses เฟ
๐Unmute Notification & Share Channel For More Content โ
๊งโช๏ธ@CodingResourses เฟ
Media is too big
VIEW IN TELEGRAM
SSRF (Server-Side Request Forgery)
What is SSRF?
Server-side request forgery is a web security vulnerability that allows an attacker to cause the server-side application to make requests to an unintended location.
In a typical SSRF attack, the attacker might cause the server to make a connection to internal-only services within the organization's infrastructure. In other cases, they may be able to force the server to connect to arbitrary external systems. This could leak sensitive data, such as authorization credentials.
Labs: Click Here
Theory: Click Here
๐Unmute Notification & Share Channel For More Content โ
๊งโช๏ธ@CodingResourses เฟ
What is SSRF?
Server-side request forgery is a web security vulnerability that allows an attacker to cause the server-side application to make requests to an unintended location.
In a typical SSRF attack, the attacker might cause the server to make a connection to internal-only services within the organization's infrastructure. In other cases, they may be able to force the server to connect to arbitrary external systems. This could leak sensitive data, such as authorization credentials.
Labs: Click Here
Theory: Click Here
๐Unmute Notification & Share Channel For More Content โ
๊งโช๏ธ@CodingResourses เฟ
Media is too big
VIEW IN TELEGRAM
โ A to Z About XSS โ
Overview: Cross-Site Scripting (XSS) attack are a type of injection,in which malicious scripts are injected into otherwise benign and trusted websites. XSS attacks occur when an attacker uses a web application to send malicious code, generally in the form of a browser side script, to a different end user. Flaws that allow these attacks to succeed are quite widespread and occur anywhere a web application uses input from a user within the output it generates without validating or encoding it.
An attacker can use XSS to send a malicious script to an unsuspecting user. The end userโs browser has no way to know that the script should not be trusted, and will execute the script. Because it thinks the script came from a trusted source, the malicious script can access any cookies, session tokens, or other sensitive information retained by the browser and used with that site.
๐Unmute Notification & Share Channel For More Content โ
๊งโช๏ธ@CodingResourses เฟ
Overview: Cross-Site Scripting (XSS) attack are a type of injection,in which malicious scripts are injected into otherwise benign and trusted websites. XSS attacks occur when an attacker uses a web application to send malicious code, generally in the form of a browser side script, to a different end user. Flaws that allow these attacks to succeed are quite widespread and occur anywhere a web application uses input from a user within the output it generates without validating or encoding it.
An attacker can use XSS to send a malicious script to an unsuspecting user. The end userโs browser has no way to know that the script should not be trusted, and will execute the script. Because it thinks the script came from a trusted source, the malicious script can access any cookies, session tokens, or other sensitive information retained by the browser and used with that site.
๐Unmute Notification & Share Channel For More Content โ
๊งโช๏ธ@CodingResourses เฟ
Media is too big
VIEW IN TELEGRAM
โ Local File Inclusion โ
An attacker can use Local File Inclusion(LFI) to trick the web application into exposing or running files on the web server. An LFI attack may lead to information disclosure, remote code execution, or even Cross-site Scripting (XSS). Typically, LFI occurs when an application uses the path to a file as input. If the application treats this input as trusted, a local file may be used in the include statement.
Local File Inclusion is very similar to Remote File Inclusion (RFI). However, an attacker using LFI may only include local files (not remote files like in the case of RFI).
Theory: Click Here
Labs : Click Here
๐Unmute Notification & Share Channel For More Content โ
๊งโช๏ธ@CodingResourses เฟ
An attacker can use Local File Inclusion(LFI) to trick the web application into exposing or running files on the web server. An LFI attack may lead to information disclosure, remote code execution, or even Cross-site Scripting (XSS). Typically, LFI occurs when an application uses the path to a file as input. If the application treats this input as trusted, a local file may be used in the include statement.
Local File Inclusion is very similar to Remote File Inclusion (RFI). However, an attacker using LFI may only include local files (not remote files like in the case of RFI).
Theory: Click Here
Labs : Click Here
๐Unmute Notification & Share Channel For More Content โ
๊งโช๏ธ@CodingResourses เฟ
Media is too big
VIEW IN TELEGRAM
Complete Cyber Security Networking
Topics:
โข What is Computer Network
โข What is WAN, WLAN, SAN, VPN & MAN
โข What is Switch
โข What is Router
โข What is HUB
โข Switch vs Router vs HUB
โข What is Server & Client
โข What is Access Point
โข What is Network Operating System
โข What is Protocol
โข What is IP Address
โข Explaining IPv4 & IPv6 in Detail
โข What is MAC Address
โข What is DNS Server
โข What is Port
โข What is ARP & RARP Requests
โข What is Network Topology
โข What is BUS & RING Topology
โข What is STAR Topology
โข What is MESH Topology
โข What is TREE Topology
Get ready to boost your cyber security networking skills with us!
๐Unmute Notification & Share Channel For More Content โ
๊งโช๏ธ@CodingResourses เฟ
Topics:
โข What is Computer Network
โข What is WAN, WLAN, SAN, VPN & MAN
โข What is Switch
โข What is Router
โข What is HUB
โข Switch vs Router vs HUB
โข What is Server & Client
โข What is Access Point
โข What is Network Operating System
โข What is Protocol
โข What is IP Address
โข Explaining IPv4 & IPv6 in Detail
โข What is MAC Address
โข What is DNS Server
โข What is Port
โข What is ARP & RARP Requests
โข What is Network Topology
โข What is BUS & RING Topology
โข What is STAR Topology
โข What is MESH Topology
โข What is TREE Topology
Get ready to boost your cyber security networking skills with us!
๐Unmute Notification & Share Channel For More Content โ
๊งโช๏ธ@CodingResourses เฟ
Media is too big
VIEW IN TELEGRAM
Bug Bounty Hunting Full Course for Beginners
Language: Hindi
What is Bug Bounty Program ?
A bug bounty program, also known as a vulnerability rewards program (VRP), offers rewards to individuals for uncovering and reporting software bugs. As part of a vulnerability management strategy, these crowdsourcing initiatives are often used by companies to supplement penetration tests and internal code audits.
๐Unmute Notification & Share Channel For More Content โ
๊งโช๏ธ@CodingResourses เฟ
Language: Hindi
What is Bug Bounty Program ?
A bug bounty program, also known as a vulnerability rewards program (VRP), offers rewards to individuals for uncovering and reporting software bugs. As part of a vulnerability management strategy, these crowdsourcing initiatives are often used by companies to supplement penetration tests and internal code audits.
๐Unmute Notification & Share Channel For More Content โ
๊งโช๏ธ@CodingResourses เฟ
๐บAdd Custom theme to your Termux application ๐ฅ Cod3r-Ak - TermuX Custom ๐บ
๐ขTermuX Custom is a GitHub repository designed to empower users to personalize their TermuX experience. With TermuX Custom, you can enhance your Termux interface with features like a customizable login screen, login sound effects, and the ability to change your shell name. The interactive terminal provides a dynamic environment for your TermuX
๐ขINSTALLATION:
๐ข
๐ข
๐ข
๐ข
๐ข
โญ๏ธ ALL COMMANDS IN SINGLE LINE
โก๏ธ
๐ชTermux tool is only for educational and experimental purpose. For more information about this tool, visit the GitHub link.๐ข
๐Unmute Notification & Share Channel For More Content โ
๊งโช๏ธ@CodingResourses เฟ
๐ขTermuX Custom is a GitHub repository designed to empower users to personalize their TermuX experience. With TermuX Custom, you can enhance your Termux interface with features like a customizable login screen, login sound effects, and the ability to change your shell name. The interactive terminal provides a dynamic environment for your TermuX
๐ขINSTALLATION:
๐ข
pkg install git
๐ข
git clone https://github.com/Cod3r-Ak/TermuX-Custom
๐ข
cd TermuX-Custom
๐ข
chmod +x *
๐ข
bash setup.sh
โญ๏ธ ALL COMMANDS IN SINGLE LINE
โก๏ธ
apt update && apt upgrade && pkg install git && git clone https://github.com/Cod3r-Ak/TermuX-Custom && cd TermuX-Custom && chmod +x * && bash setup.sh
๐ชTermux tool is only for educational and experimental purpose. For more information about this tool, visit the GitHub link.๐ข
๐Unmute Notification & Share Channel For More Content โ
๊งโช๏ธ@CodingResourses เฟ
GitHub
GitHub - Cod3r-Ak/TermuX-Custom: TermuX Custom is a GitHub repository designed to empower users to personalize their TermuX experience.โฆ
TermuX Custom is a GitHub repository designed to empower users to personalize their TermuX experience. With TermuX Custom, you can enhance your Termux interface with features like a customizable lo...
๐ช List of Cryptography Tools used in CTFs โพ
Decoder 1: www.dcode.fr/
symbols-ciphers
Decoder 2: cryptii.com
Dedcoder 3: gchq.github.io/CyberChef
Decoder 4: crackstation.net
Rot Decoder: theblob.org/rot.cgi
Twin Hex: www.calcresult.com/misc/cyphers/twin-hex.html
Hacking Learning Paid Private Channelโญ๏ธ dm @hitanshkadakia
๐Unmute Notification & Share Channel For More Content โ
๊งโช๏ธ@CodingResourses เฟ
Decoder 1: www.dcode.fr/
symbols-ciphers
Decoder 2: cryptii.com
Dedcoder 3: gchq.github.io/CyberChef
Decoder 4: crackstation.net
Rot Decoder: theblob.org/rot.cgi
Twin Hex: www.calcresult.com/misc/cyphers/twin-hex.html
Hacking Learning Paid Private Channelโญ๏ธ dm @hitanshkadakia
๐Unmute Notification & Share Channel For More Content โ
๊งโช๏ธ@CodingResourses เฟ
gchq.github.io
CyberChef
The Cyber Swiss Army Knife - a web app for encryption, encoding, compression and data analysis
๐Instantly Withdraw $4.32
๐ฐYou can sell instantly
๐ขJoin: https://t.me/privateton_bot/start?startapp=ref_818598249
โJoin Telegram
โConnect tonkeeper
โDo Refer and Withdraw
โNote: You Can sell Instantly After Withdraw, and Withdraw also Instantly
#paidpromotion
๐ฐYou can sell instantly
๐ขJoin: https://t.me/privateton_bot/start?startapp=ref_818598249
โJoin Telegram
โConnect tonkeeper
โDo Refer and Withdraw
โNote: You Can sell Instantly After Withdraw, and Withdraw also Instantly
#paidpromotion
Media is too big
VIEW IN TELEGRAM
๐ How To Hack Android Phone By Its IP Address Using Phone SpolitPro ๐
All The Requirements Are Given In The Video โ๏ธ
๐ Commands For Linux
โก๏ธ git clone https://github.com/AzeemIdrisi/PhoneSploit-Pro.git
โก๏ธ cd PhoneSploit-Pro/
โก๏ธ pip install -r requirements.txt
โก๏ธ python3 phonesploitpro.py
๐Unmute Notification & Share Channel For More Content โ
๊งโช๏ธ@CodingResourses เฟ
All The Requirements Are Given In The Video โ๏ธ
๐ Commands For Linux
โก๏ธ git clone https://github.com/AzeemIdrisi/PhoneSploit-Pro.git
โก๏ธ cd PhoneSploit-Pro/
โก๏ธ pip install -r requirements.txt
โก๏ธ python3 phonesploitpro.py
๐Unmute Notification & Share Channel For More Content โ
๊งโช๏ธ@CodingResourses เฟ