Forwarded from Cybertix
๐๐ฉ๐-๐ฎ๐ฌ๐ฎ๐ฏ-๐ฎ๐ฎ๐ฑ๐ญ๐ด - Improper Authorization Vulnerability in Confluence Data Center and Server ๐ข๐ป๐ฒ๐น๐ถ๐ป๐ฒ๐ฟ
๐๐๐ฃ๐ :
https://twitter.com/thecybertix/status/1722510192368328798?t=h10VjaG5Y-GUIM0irSWDMg&s=19
๐๐๐ฃ๐ :
https://twitter.com/thecybertix/status/1722510192368328798?t=h10VjaG5Y-GUIM0irSWDMg&s=19
Forwarded from Angry Saffron เฅค OSINTเฅค Global Conflictsเฅค Political Updatesเฅค National Security (ใ
ค)
Pakistan tops the chart yet again in spreading global terrorism.
14 Pakistanis have been arrested for Islamic terror activities in Spain.
๐ https://twitter.com/_treeni/status/1722499792759365833
๐ ๐บ@AngrySaffron
14 Pakistanis have been arrested for Islamic terror activities in Spain.
Please open Telegram to view this post
VIEW IN TELEGRAM
Forwarded from CYBER TRICKS ZONE ๐ฎ๐ณ
Media is too big
VIEW IN TELEGRAM
Safe your Wireless Network.mp4
Forwarded from Cybertix
๐๐๐ด: Server allows TCP and UDP proxying to internal Network
๐๐ผ๐๐ป๐๐: ๐ฏ๐ฑ๐ฌ๐ฌ$ ๐
๐ฉ๐ถ๐ฑ๐ฒ๐ผ ๐ฃ๐ผ๐: https://youtu.be/DVofk14u_sU?si=mufceg26zW0oqIv_
Please Like & Subscribe to our YouTube channel. ๐
.
.
.
Coming Soon, with ๐ฝ๐ช๐ ๐ฝ๐ค๐ช๐ฃ๐ฉ๐ฎ ๐๐ก๐๐ฎ๐ก๐๐จ๐ฉ ๐ฅ
๐๐ผ๐๐ป๐๐: ๐ฏ๐ฑ๐ฌ๐ฌ$ ๐
๐ฉ๐ถ๐ฑ๐ฒ๐ผ ๐ฃ๐ผ๐: https://youtu.be/DVofk14u_sU?si=mufceg26zW0oqIv_
Please Like & Subscribe to our YouTube channel. ๐
.
.
.
Coming Soon, with ๐ฝ๐ช๐ ๐ฝ๐ค๐ช๐ฃ๐ฉ๐ฎ ๐๐ก๐๐ฎ๐ก๐๐จ๐ฉ ๐ฅ
YouTube
Server allows TCP and UDP proxying to internal network | Got Bounty of $ 3500๐ค
๐๐ฝ๐๐ ๐๐๐ฅ๐๐ง๐: https://hackerone.com/reports/333419
๐๐ฑ๐ค๐๐ฃ ๐ค๐๐ง ๐ช๐ค๐๐ข๐๐ฃ๐๐ฉ๐ :
๐ด๐๐๐๐๐จ๐๐ฅ๐ https://whatsapp.com/channel/0029VaA7sQ6KLaHx1kHh533H
๐ด๐๐๐ก๐๐๐๐๐
https://t.me/thecybertix
๐ด BE MY FRIEND
๐๐๐ฃ๐จ๐ฉ๐๐๐ง๐๐ข : https://www.instagram.com/thecybertix/
๐๐๐ฌ๐๐ฉ๐ฉ๐๐ง:โฆ
๐๐ฑ๐ค๐๐ฃ ๐ค๐๐ง ๐ช๐ค๐๐ข๐๐ฃ๐๐ฉ๐ :
๐ด๐๐๐๐๐จ๐๐ฅ๐ https://whatsapp.com/channel/0029VaA7sQ6KLaHx1kHh533H
๐ด๐๐๐ก๐๐๐๐๐
https://t.me/thecybertix
๐ด BE MY FRIEND
๐๐๐ฃ๐จ๐ฉ๐๐๐ง๐๐ข : https://www.instagram.com/thecybertix/
๐๐๐ฌ๐๐ฉ๐ฉ๐๐ง:โฆ
Forwarded from CYBER TRICKS ZONE ๐ฎ๐ณ
Here's a list of 100 cybersecurity tools:
1. Wireshark
2. Nmap
3. Metasploit
4. Burp Suite
5. Snort
6. Aircrack-ng
7. John the Ripper
8. Maltego
9. Cain and Abel
10. Nessus
11. OpenVAS
12. Wireshark
13. Netcat
14. tcpdump
15. OSSEC
16. ModSecurity
17. Hydra
18. Acunetix
19. Qualys
20. OWASP ZAP
21. Grep
22. OWASP Dependency-Check
23. Suricata
24. OSQuery
25. AlienVault OSSIM
26. OSSEC
27. Wfuzz
28. OSQuery
29. Fail2ban
30. Nikto
31. SQLMap
32. Zeek (formerly Bro)
33. LogRhythm
34. QRadar
35. Snorby
36. QRadar
37. IronPort
38. AlienVault USM
39. Cisco Umbrella
40. SolarWinds
41. SolarWinds
42. ManageEngine OpManager
43. Nagios
44. Splunk
45. ELK Stack
46. Stealthwatch
47. Intrusion Detection System (IDS)
48. Intrusion Prevention System (IPS)
49. Kali Linux
50. GFI LanGuard
51. Wireshark
52. tcpdump
53. Squid
54. Suricata
55. FireEye
56. Palo Alto Networks
57. Blue Coat (Symantec)
58. Forcepoint (formerly Websense)
59. Crowdstrike
60. Carbon Black
61. Fiddler
62. OWASP WebGoat
63. OWASP Mutillidae
64. OWASP Juice Shop
65. Security Onion
66. OSSEC
67. Bro (Zeek)
68. OWASP ZAP
69. Cuckoo Sandbox
70. ClamAV
71. Snort
72. Bro (Zeek)
73. HAVP
74. Fiddler
75. Pyrit
76. WPScan
77. W3AF
78. Tails
79. Nipper
80. Wfuzz
81. THOR
82. Wazuh
83. Shodan
84. TCPReplay
85. OWASP Dependency-Check
86. RATools
87. Xplico
88. WhatWeb
89. OWASP OWTF
90. AIDE
91. Cuckoo Sandbox
92. OSQuery
93. Sagan
94. Snorby
95. Nikto
96. Lynis
97. Wazuh
98. OSQuery
99. Security Onion
100. OWASP OWTF
1. Wireshark
2. Nmap
3. Metasploit
4. Burp Suite
5. Snort
6. Aircrack-ng
7. John the Ripper
8. Maltego
9. Cain and Abel
10. Nessus
11. OpenVAS
12. Wireshark
13. Netcat
14. tcpdump
15. OSSEC
16. ModSecurity
17. Hydra
18. Acunetix
19. Qualys
20. OWASP ZAP
21. Grep
22. OWASP Dependency-Check
23. Suricata
24. OSQuery
25. AlienVault OSSIM
26. OSSEC
27. Wfuzz
28. OSQuery
29. Fail2ban
30. Nikto
31. SQLMap
32. Zeek (formerly Bro)
33. LogRhythm
34. QRadar
35. Snorby
36. QRadar
37. IronPort
38. AlienVault USM
39. Cisco Umbrella
40. SolarWinds
41. SolarWinds
42. ManageEngine OpManager
43. Nagios
44. Splunk
45. ELK Stack
46. Stealthwatch
47. Intrusion Detection System (IDS)
48. Intrusion Prevention System (IPS)
49. Kali Linux
50. GFI LanGuard
51. Wireshark
52. tcpdump
53. Squid
54. Suricata
55. FireEye
56. Palo Alto Networks
57. Blue Coat (Symantec)
58. Forcepoint (formerly Websense)
59. Crowdstrike
60. Carbon Black
61. Fiddler
62. OWASP WebGoat
63. OWASP Mutillidae
64. OWASP Juice Shop
65. Security Onion
66. OSSEC
67. Bro (Zeek)
68. OWASP ZAP
69. Cuckoo Sandbox
70. ClamAV
71. Snort
72. Bro (Zeek)
73. HAVP
74. Fiddler
75. Pyrit
76. WPScan
77. W3AF
78. Tails
79. Nipper
80. Wfuzz
81. THOR
82. Wazuh
83. Shodan
84. TCPReplay
85. OWASP Dependency-Check
86. RATools
87. Xplico
88. WhatWeb
89. OWASP OWTF
90. AIDE
91. Cuckoo Sandbox
92. OSQuery
93. Sagan
94. Snorby
95. Nikto
96. Lynis
97. Wazuh
98. OSQuery
99. Security Onion
100. OWASP OWTF
Forwarded from CYBER TRICKS ZONE ๐ฎ๐ณ
5 Youtube Channels to Learn JavaScript:
1. Hitesh Choudhary
2. Akshay Saini
3. Traversy Media
4. Net Ninja
5. Codevolution
1. Hitesh Choudhary
2. Akshay Saini
3. Traversy Media
4. Net Ninja
5. Codevolution
Forwarded from CYBER TRICKS ZONE ๐ฎ๐ณ
HTTPS, SSL Handshake, and Data Encryption Explained to Kids.
HTTPS: Safeguards your data from eavesdroppers and breaches. Understand how encryption and digital certificates create an impregnable shield.
SSL Handshake: Behind the Scenes โ Witness the cryptographic protocols that establish a secure connection. Experience the intricate exchange of keys and negotiation.
Secure Data Transmission: Navigating the Tunnel โ Journey through the encrypted tunnel forged by HTTPS. Learn how your information travels while shielded from cyber threats.
HTML's Role: Peek into HTML's role in structuring the web. Uncover how hyperlinks and content come together seamlessly. And why is it called HYPER TEXT.
Over to you: In this ever-evolving digital landscape, what emerging technologies do you foresee shaping the future of cybersecurity or the web?
HTTPS: Safeguards your data from eavesdroppers and breaches. Understand how encryption and digital certificates create an impregnable shield.
SSL Handshake: Behind the Scenes โ Witness the cryptographic protocols that establish a secure connection. Experience the intricate exchange of keys and negotiation.
Secure Data Transmission: Navigating the Tunnel โ Journey through the encrypted tunnel forged by HTTPS. Learn how your information travels while shielded from cyber threats.
HTML's Role: Peek into HTML's role in structuring the web. Uncover how hyperlinks and content come together seamlessly. And why is it called HYPER TEXT.
Over to you: In this ever-evolving digital landscape, what emerging technologies do you foresee shaping the future of cybersecurity or the web?
Please open Telegram to view this post
VIEW IN TELEGRAM
Forwarded from CYBER TRICKS ZONE ๐ฎ๐ณ
Securing Your Website: Understanding SQL Injection, Defending Against SQLi Attacks, and Unveiling Common Techniques :- https://nikhiltrickzone.blogspot.com/2023/11/securing-your-website-understanding-sql.html
๐ฅ๐งจเคธเคฐเฅเคตเคเฅเคเฅ เคธเคฐเฅเคตเคตเคฐเคฆเฅ เคธเคฐเฅเคตเคฆเฅเคทเฅเคเคญเคฏเคเคเคฐเคฟเฅค
เคธเคฐเฅเคตเคฆเฅเคเคเคนเคฐเฅ เคฆเฅเคตเคฟ เคฎเคนเคพเคฒเคเฅเคทเฅเคฎเคฟ เคจเคฎเฅเคฝเคธเฅเคคเฅเคคเฅ เฅคเฅค
เคฎเคพเคคเคพ เคฒเคเฅเคทเฅเคฎเฅ เคเคชเคเฅ เคธเคฌ เคเคทเฅเค เคนเคฐเฅเคเฅค๐งจ๐ฅ
๐๐ปเคถเฅเคญ เคฆเฅเคชเคพเคตเคฒเฅเฅคเฅค๐๐ป
@crackcodes @cybertrickzone
@cyberdin1
system32.ink
Crackcodes.in
Telelearn.in
เคธเคฐเฅเคตเคฆเฅเคเคเคนเคฐเฅ เคฆเฅเคตเคฟ เคฎเคนเคพเคฒเคเฅเคทเฅเคฎเคฟ เคจเคฎเฅเคฝเคธเฅเคคเฅเคคเฅ เฅคเฅค
เคฎเคพเคคเคพ เคฒเคเฅเคทเฅเคฎเฅ เคเคชเคเฅ เคธเคฌ เคเคทเฅเค เคนเคฐเฅเคเฅค๐งจ๐ฅ
๐๐ปเคถเฅเคญ เคฆเฅเคชเคพเคตเคฒเฅเฅคเฅค๐๐ป
@crackcodes @cybertrickzone
@cyberdin1
system32.ink
Crackcodes.in
Telelearn.in
โก๏ธโก๏ธKhaIistani supporter & close aide of Nijjar, Harpreet Singh Uppal & son, shot dead in CANADA๐๐.
UNKNOWN STRIKES AGAIN.
Shubh DIWALI!!
UNKNOWN STRIKES AGAIN.
Shubh DIWALI!!
Forwarded from BlackDragonSec ๐ฎ๐ณ
https://pollo.pk/BDS.html
https://smartups.pk/BDS.html
https://solarenergy.pk/BDS.html
https://salamwelfaretrust.org/BDS.html
https://zafarkhansupari.com/BDS.html
https://singaporeplaza.pk/BDS.html
https://securitysystem.pk/BDS.html
https://yiwuburaaq.com/BDS.html
https://markaz.com.pk/BDS.html
tajarwelfarehospital.com/BDS.html
๐ฉ เคเคฏ เคธเฅเคคเคพเคฐเคพเคฎ ๐ฉ
๐๐ผ๐ช๐ เคถเฅเคญ เคฆเฅเคชเคพเคตเคฒเฅ ๐๐ช๐๐ผ
#IndianHackers
#BlackDragonSec
#HappyDiwaliTeaM
https://smartups.pk/BDS.html
https://solarenergy.pk/BDS.html
https://salamwelfaretrust.org/BDS.html
https://zafarkhansupari.com/BDS.html
https://singaporeplaza.pk/BDS.html
https://securitysystem.pk/BDS.html
https://yiwuburaaq.com/BDS.html
https://markaz.com.pk/BDS.html
tajarwelfarehospital.com/BDS.html
๐ฉ เคเคฏ เคธเฅเคคเคพเคฐเคพเคฎ ๐ฉ
๐๐ผ๐ช๐ เคถเฅเคญ เคฆเฅเคชเคพเคตเคฒเฅ ๐๐ช๐๐ผ
#IndianHackers
#BlackDragonSec
#HappyDiwaliTeaM
Forwarded from Cybertix
๐ก๐ฒ๐ ๐ฃ๐น๐ฎ๐๐น๐ถ๐๐: ๐๐๐ด๐๐ผ๐๐ป๐๐๐
Watch Now, How to use ๐ฌ๐๐ฎ๐๐๐๐ ๐ช๐ง๐ก๐จ ๐๐ฃ ๐ฎ๐ค๐ช๐ง ๐๐๐๐ค๐ฃ ๐ค
Please ๐๐๐ ๐ & ๐๐ช๐๐จ๐๐ง๐๐๐ to our YouTube channel๐๐ป
๐ช๐ฎ๐๐ฐ๐ต ๐ก๐ผ๐: https://youtu.be/n3dSWd7NLWs?si=LPKoDfBDz46wMjTw
Watch Now, How to use ๐ฌ๐๐ฎ๐๐๐๐ ๐ช๐ง๐ก๐จ ๐๐ฃ ๐ฎ๐ค๐ช๐ง ๐๐๐๐ค๐ฃ ๐ค
Please ๐๐๐ ๐ & ๐๐ช๐๐จ๐๐ง๐๐๐ to our YouTube channel๐๐ป
๐ช๐ฎ๐๐ฐ๐ต ๐ก๐ผ๐: https://youtu.be/n3dSWd7NLWs?si=LPKoDfBDz46wMjTw
YouTube
01 Recon - Get hands-on with Waybackurls
๐๐ฑ๐ค๐๐ฃ ๐ค๐๐ง ๐ช๐ค๐๐ข๐๐ฃ๐๐ฉ๐ :
๐ด๐๐๐๐๐จ๐๐ฅ๐ https://whatsapp.com/channel/0029VaA7sQ6KLaHx1kHh533H
๐ด๐๐๐ก๐๐๐๐๐
https://t.me/thecybertix
๐ด BE MY FRIEND
๐๐๐ฃ๐จ๐ฉ๐๐๐ง๐๐ข : https://www.instagram.com/thecybertix/
๐๐๐ฌ๐๐ฉ๐ฉ๐๐ง: : https://twitter.com/thecybertix
๐๐๐๐ฃ๐ ๐๐๐๐ฃ:โฆ
๐ด๐๐๐๐๐จ๐๐ฅ๐ https://whatsapp.com/channel/0029VaA7sQ6KLaHx1kHh533H
๐ด๐๐๐ก๐๐๐๐๐
https://t.me/thecybertix
๐ด BE MY FRIEND
๐๐๐ฃ๐จ๐ฉ๐๐๐ง๐๐ข : https://www.instagram.com/thecybertix/
๐๐๐ฌ๐๐ฉ๐ฉ๐๐ง: : https://twitter.com/thecybertix
๐๐๐๐ฃ๐ ๐๐๐๐ฃ:โฆ
Please open Telegram to view this post
VIEW IN TELEGRAM
Please open Telegram to view this post
VIEW IN TELEGRAM