CYBER TRICKS ZONE ๐Ÿ‡ฎ๐Ÿ‡ณ
3.7K subscribers
812 photos
249 videos
662 files
2.74K links
This channel/community aims to provide free courses related to programming,web development, cyber security, ethical hacking and many more tech related stuff and news #programming, #coding, #ethicalhacking #cybersecurity. About: @about_cybertrickszone
Download Telegram
Skills you need to become ๐Ÿ˜ŽHacker๐Ÿ˜Ž

1. Networking
2. Linux Skills
3. Programming Skills
4. Reverse Engineering
5. Cryptography Skills
6. Data Base
๐Ÿฆนโ€โ™‚๐Ÿฆนโ€โ™‚Web Intelligence
Researching Domains๐Ÿฆนโ€โ™‚๐Ÿฆนโ€โ™‚

Web intelligence (WEBINT) is a means to efficiently identify the intelligence available in open source (OSINT). Structuring and visualizing web-based information allows an analyst to surface tactical information like technical indicators, and strategic understandings like the swaying sentiment of a troubled region.

๐ŸŽTools Link ๐ŸŽ
๐ŸAccess Check
https://accesscheck.thenetmonitor.org
๐ŸAFRINIC
https://www.afrinic.net
๐ŸAPNIC
https://www.apnic.net
๐ŸARIN
https://www.arin.net
๐Ÿ Website Search Tool
https://www.aware-online.com/osint-tools/website-search-tool
๐ŸBetter Whois
http://www.betterwhois.com
๐ŸCentral Ops
http://centralops.net
๐ŸComplete DNS
https://completedns.com
๐ŸDaily Changes
http://dailychanges.domaintools.com
๐ŸDanger Zone
https://github.com/woj-ciech/Danger-zone
๐ŸDa.whois
https://dawhois.com
๐ŸDedicated or Not
http://dedicatedornot.com
๐ŸDenic web whois
https://www.denic.de/webwhois
๐ŸDNSDumpster
https://dnsdumpster.com
๐ŸDNS History
http://dnshistory.org
๐ŸDNS Lookup
https://dnslookup.online
๐ŸDNSlytics
https://dnslytics.com
๐Ÿdnspop
https://github.com/bitquark/dnspop
๐ŸDNS Queries
https://www.dnsqueries.com
๐Ÿdnsrecon
https://github.com/darkoperator/dnsrecon
๐ŸDNS Root Instances
https://atlas.ripe.net/results/maps/root-instances
๐ŸDNSSec Analyzer
https://dnssec-analyzer.verisignlabs.com
๐ŸIMK-CREDITS
https://bio.cool/itsmekali
๐ŸDNS Spy
https://dnsspy.io
๐ŸDNSStuff
http://www.dnsstuff.com
๐ŸDNSTools
http://www.dnstools.ch
๐ŸDNS Trails
http://dnstrails.com
๐ŸDNS Trails
https://securitytrails.com/dns-trails
๐Ÿdnstwist
https://github.com/elceef/dnstwist
๐Ÿdnstwist
https://dnstwist.it
๐Ÿdnstwister
https://dnstwister.report
๐ŸDNSViz
http://dnsviz.net
๐ŸDomain Big Data
http://domainbigdata.com
๐ŸDomain Crawler
http://www.domaincrawler.com
๐ŸDomain Dossier
http://centralops.net/co/DomainDossier.aspx
๐ŸDomain Eye
https://domaineye.com
๐ŸDomainIQ
https://www.domainiq.com
๐ŸDomain SDB
https://domainsdb.info
๐ŸDomain To IP Converter
http://domaintoipconverter.com
๐ŸDomain Tools
https://www.domaintools.com
๐ŸDomain Tools
http://whois.domaintools.com
๐ŸDomEye
https://xaviesteve.com/domeye
๐Ÿdowndetector
http://downdetector.com
๐Ÿdownforeveryoneorjustme
http://downforeveryoneorjustme.com
๐ŸDNS Checker
https://dnschecker.org
๐ŸDShield API
https://isc.sans.edu/api
๐ŸEasyCounter WHois
https://whois.easycounter.com
๐ŸEasy whois
https://www.easywhois.com
๐ŸEducause Whois Lookup
https://net.educause.edu/whois.htm
๐ŸGeektools
http://www.geektools.com/whois.php
๐ŸLookup
https://www.infobyip.com/ipbulklookup.php
๐ŸNetwork Tools
http://network-tools.com
๐ŸNS.Tools
https://ns.tools
Onyphe
https://www.onyphe.io
๐ŸOpenData Rapid7
https://opendata.rapid7.com
๐ŸThe Prefix Whois Project
https://pwhois.org
๐ŸPTRArchive
http://ptrarchive.com
๐ŸPurplepee.com https://purplepee.co
๐ŸRedirectDetective
http://redirectdetective.com
Forwarded from CrackCodes ๐Ÿ‡ฎ๐Ÿ‡ณ (Prapatti ็ˆชใ„šๅ‡ าœ)
๐Ÿ“ŒRCE in Juniper JunOS CVE-2023-36844-47 Exploit : Download

๐Ÿช…Pocket Access โ€“ Telegram Bot For Remote Access To Computer Files : Download

๐ŸธInternational Civil Defense Organization Data Leak : Download

๐Ÿค–CVE-2023-40930 POC: Skyworth 3.0 (Android) โ€“ Directory Traversal : Explore

๐Ÿ•ธInvicti Standard v23.9.0.42095 Crack : Download

๐Ÿ“ฏSartrouville Company France Data Leak : Download

๐ŸŒšAranui Cruises Data Leak : Download

๐Ÿ€Craxs Rat V6.7 : DOwnload

๐ŸชฌURL Infection: Exploit Silent Java Drive By Downloads Chrome : Explore

๐ŸงฎCVE-2023-41362 โ€“ MyBB ACP RCE Exploit : Explore

๐Ÿ‘พCVE-2023-3244 POC: WordPress Missing Authorization: Explore

๐Ÿ“OpenText EnCase Forensic Tool : Download

๐ŸฒTelegram Get remote IP: Get IP Address on Other Side Audio Call In Telegram : Check
Forwarded from CrackCodes ๐Ÿ‡ฎ๐Ÿ‡ณ (Prapatti ็ˆชใ„šๅ‡ าœ)
๐Ÿ“ŒRCE in Juniper JunOS CVE-2023-36844-47 Exploit : Download

๐Ÿช…Pocket Access โ€“ Telegram Bot For Remote Access To Computer Files : Download

๐ŸธInternational Civil Defense Organization Data Leak : Download

๐Ÿค–CVE-2023-40930 POC: Skyworth 3.0 (Android) โ€“ Directory Traversal : Explore

๐Ÿ•ธInvicti Standard v23.9.0.42095 Crack : Download

๐Ÿ“ฏSartrouville Company France Data Leak : Download

๐ŸŒšAranui Cruises Data Leak : Download

๐Ÿ€Craxs Rat V6.7 : DOwnload

๐ŸชฌURL Infection: Exploit Silent Java Drive By Downloads Chrome : Explore

๐ŸงฎCVE-2023-41362 โ€“ MyBB ACP RCE Exploit : Explore

๐Ÿ‘พCVE-2023-3244 POC: WordPress Missing Authorization: Explore

๐Ÿ“OpenText EnCase Forensic Tool : Download

๐ŸฒTelegram Get remote IP: Get IP Address on Other Side Audio Call In Telegram : Check
โ˜€๏ธPassword cracking techniquesโ˜€๏ธ

There are a number of techniques that can be used to crack passwords. We will describe the most commonly used ones below;

โœ”๏ธDictionary attackโ€“ This method involves the use of a wordlist to compare against user passwords.

โœ”๏ธBrute force attackโ€“ This method is similar to the dictionary attack. Brute force attacks use algorithms that combine alpha-numeric characters and symbols to come up with passwords for the attack. For example, a password of the value โ€œpasswordโ€ can also be tried as p@$$word using the brute force attack.

โœ”๏ธRainbow table attackโ€“ This method uses pre-computed hashes. Letโ€™s assume that we have a database which stores passwords as md5 hashes. We can create another database that has md5 hashes of commonly used passwords. We can then compare the password hash we have against the stored hashes in the database. If a match is found, then we have the password.

โœ”๏ธGuessโ€“ As the name suggests, this method involves guessing. Passwords such as qwerty, password, admin, etc. are commonly used or set as default passwords. If they have not been changed or if the user is careless when selecting passwords, then they can be easily compromised.

โœ”๏ธSpideringโ€“ Most organizations use passwords that contain company information. This information can be found on company websites, social media such as facebook, twitter, etc. Spidering gathers information from these sources to come up with word lists. The word list is then used to perform dictionary and brute force attacks.
Media is too big
VIEW IN TELEGRAM
โญ๏ธ Creating a Pishing Website using Kali Linux

โญ๏ธOverview
In this Video you will learnt about how to create a pishing website with the help of Kali Linux along with it's live example and trial too. So watch it.
Media is too big
VIEW IN TELEGRAM
โญ๏ธ Start Kali Linux with Ethical Hacking and Penetration Testing 2023

๐Ÿ˜€๐Ÿ˜€โž–โž–โž–โž–โž–โž–โž–

โœ…Duration : 4 Hours 12 Minutes
โคPlatform : Telegram
Google is offering FREE online courses.

No payment needed.

Here're 10 Google courses to get certified:

1. Applied Data Science with Python

Become a Data Scientist with this awesome program.

โ†’ 6 hours to complete
โ†’ 8 Chapters
โ†’ FREE Certificate

๐Ÿ”— https://lnkd.in/dTf3QUMb

2. Fundamentals of Digital Marketing

Learn how to use the internet to grow your business or career.

โ†’ 40 hours to complete
โ†’ Beginner friendly
โ†’ FREE Certificate

๐Ÿ”— https://lnkd.in/df_2wSDX

3. Google Analytics 4 Certification

Learn how to use Google Analytics 4, the best web analytics tool, to grow your online business.

โ†’ 5 hours to complete
โ†’ Intermediate level
โ†’ Data-driven marketing
โ†’ FREE certificate

๐Ÿ”— https://lnkd.in/ddjFSQcM

4. Google Ads Search Certification

Show your skill in creating and optimizing Google Search campaigns that reach your goals.

โ†’ 4 hours to complete
โ†’ Intermediate level
โ†’ FREE certificate

๐Ÿ”— https://lnkd.in/duH6e3Z4

5. Google Ads Display Certification

Learn how to use Google Display features, optimize your campaigns, and measure your results.

โ†’ 3 hours to complete
โ†’ Beginner level
โ†’ FREE certificate

๐Ÿ”— https://lnkd.in/dDCSAwSk

6. YouTube Music Certification

Learn how to use YouTube Music, the best music streaming service, to grow your audience, monetize your content, and optimize your performance.

โ†’ 4 hours to complete
โ†’ Advanced level
โ†’ FREE certificate

๐Ÿ”— https://lnkd.in/dRtUDUmS

7. Get started with Google Maps Platform

Learn how to use Google Maps Platform to create interactive web maps and manage your projects in the Google Cloud Console.

๐Ÿ”— https://lnkd.in/dmfKbWnu

8. Build apps with Flutter

Learn the skills to create visually appealing desktop, mobile, and web applications using Flutter, all built from a single codebase.

๐Ÿ”— https://lnkd.in/dAJ4tXy8

9. Introduction to SQL

Discover the fundamentals of utilizing SQL for extracting and controlling data within a relational database.

๐Ÿ”— https://lnkd.in/dtbGAEu4

10. Generative AI [Mega Course]

Learn everything you need to know about generative AI products and technologies in this comprehensive course.

๐Ÿ”— https://lnkd.in/dcUbCAPB

Happy Learning ๐ŸŒŸ
----------------------------------------------------------------------
if you found this post helpful:

1๏ธโƒฃ Join Telegram for more Free Coding & AI Courses, hacking courses , tech and tips https://telegram.me/cybertrickzone
๐—™๐—ฅ๐—˜๐—˜ (๐—š๐—ผ๐—ผ๐—ด๐—น๐—ฒ) ๐—–๐—ผ๐˜‚๐—ฟ๐˜€๐—ฒ๐˜€ ๐˜†๐—ผ๐˜‚ ๐˜„๐—ถ๐—น๐—น ๐—ฟ๐—ฒ๐—ด๐—ฟ๐—ฒ๐˜ ๐—ป๐—ผ๐˜ ๐˜๐—ฎ๐—ธ๐—ถ๐—ป๐—ด ๐—ถ๐—ป ๐Ÿฎ๐Ÿฌ๐Ÿฎ๐Ÿฏ.

1. Google Project Management

๐Ÿ”—https://lnkd.in/deM4-ATJ

2. Agile Project Management

๐Ÿ”—https://lnkd.in/dzBGr4Xp

3. Project Execution: Running the Project

๐Ÿ”—https://lnkd.in/dB5aZ4Fn

4. Foundations of Project Management

๐Ÿ”—https://lnkd.in/dGkjks2x

5. Project Initiation: Starting a Successful Project

๐Ÿ”—https://lnkd.in/d_NzEpaH

6. Project Planning: Putting It All Together

๐Ÿ”—https://lnkd.in/dF2BP4uA

7. Google Analytics for Power Users

๐Ÿ”—https://lnkd.in/dhPzZYKu

8. Fundamentals of digital marketing

๐Ÿ”—https://lnkd.in/dBS58kFc

9. Python Basics for Data Analysis

๐Ÿ”—https://lnkd.in/dsihXekD

10. Data Science Foundations

๐Ÿ”—https://lnkd.in/dRNWbj_r

11. Advanced Google Analytics

๐Ÿ”—https://lnkd.in/dMpbPc_h

14. Google Cloud Computing Foundations:

๐Ÿ”—https://lnkd.in/duxCQG7X

15. Data, ML, and AI in Google Cloud

๐Ÿ”—https://lnkd.in/dx3YJ7HG

17. Machine Learning Crash Course

๐Ÿ”—https://lnkd.in/dYPwDH5G

18. Basics of Machine Learning

๐Ÿ”—https://lnkd.in/dKRZPDpE

19. Data Science with Python

๐Ÿ”—https://lnkd.in/dKDQvhFs

Share and support us โค๏ธ

By : @cybertrickzone
๐‘๐ž๐ ๐“๐ž๐š๐ฆ ๐“๐จ๐จ๐ฅ๐ฌ ๐Ÿ”ฅ

๐Ÿ”ด RECONNAISSANCE:
- RustScan ==> https://lnkd.in/ebvRfBNy
- NmapAutomator ==> https://lnkd.in/gu5wxzf6
- AutoRecon ==> https://lnkd.in/g3DeG6YT
- Amass ==> https://lnkd.in/e7V569N5
- CloudEnum ==> https://lnkd.in/ePHDeGZv
- Recon-NG ==> https://lnkd.in/edwaXFjS
- AttackSurfaceMapper ==> https://lnkd.in/ebbcj6Rm
- DNSDumpster ==> https://dnsdumpster.com/

๐Ÿ”ด INITIAL ACCESS:
- SprayingToolKit ==> https://lnkd.in/eBSAPz5z
- o365Recon ==> https://lnkd.in/eJwCx-Ga
- Psudohash ==> https://lnkd.in/gcaxV6fR
- CredMaster ==> https://lnkd.in/gtMEDVuS
- DomainPasswordSpray ==> https://lnkd.in/guWj4TYv
- TheSprayer ==> https://lnkd.in/gZVuQYiv
- TREVORspray ==> https://lnkd.in/gHgcbjgV

๐Ÿ”ด DELIVERY:
- o365AttackToolKit ==> https://lnkd.in/etCCYi8y
- EvilGinx2 ==> https://lnkd.in/eRDPvwUg
- GoPhish ==> https://lnkd.in/ea26dfNg
- PwnAuth ==> https://lnkd.in/eqecM7de
- Modlishka ==> https://lnkd.in/eds-dR5C

๐Ÿ”ด COMMAND AND CONTROL:
- PoshC2 ==> https://lnkd.in/eqSJUDji
- Sliver ==> https://lnkd.in/ewN9Nday
- SILENTTRINITY ==> https://lnkd.in/eeZGbYMs
- Empire ==> https://lnkd.in/egAPa8gY
- AzureC2Relay ==> https://lnkd.in/efmh2t3g
- Havoc C2 ==> https://lnkd.in/gEFp2iym
- Mythic C2 ==> https://lnkd.in/gnCGwfWk

๐Ÿ”ด CREDENTIAL DUMPING:
- MimiKatz ==> https://lnkd.in/etEGfvJK
- HekaTomb ==> https://lnkd.in/eJx5Ugu5
- SharpLAPS ==> https://lnkd.in/eA28n9FT
- Net-GPPPassword ==> https://lnkd.in/e3CTez5A
- PyPyKatz ==> https://lnkd.in/eeb5b6Tz

๐Ÿ”ด PRIVILEGE ESCALATION:
- SharpUp ==> https://lnkd.in/etR2Pe_n
- MultiPotato ==> https://lnkd.in/eq53PXcJ
- PEASS ==> https://lnkd.in/eWA66akh
- Watson ==> https://lnkd.in/eZfYMSMX
- Bat-Potato ==> https://lnkd.in/gjziyG8q

๐Ÿ”ด DEFENSE EVASION:
- Villain ==> https://lnkd.in/gquyGFm5
- EDRSandBlast ==> https://lnkd.in/e8g8zYFT
- SPAWN - Cobalt Strike BOF ==> https://lnkd.in/e223PbqZ
- NetLoader ==> https://lnkd.in/ef5wCD4y
- KillDefenderBOF ==> https://lnkd.in/eVd54HUp
- ThreatCheck ==> https://lnkd.in/eHvSPakR
- Freeze ==> https://lnkd.in/eNUh3zCi
- GadgetToJScript ==> https://lnkd.in/egPQBBXJ

๐Ÿ”ด PERSISTENCE:
- SharPyShell ==> https://lnkd.in/eXm8h8Bj
- SharpStay ==> https://lnkd.in/erRbeFMj
- SharpEventPersist ==> https://lnkd.in/e_kJFNiB

๐Ÿ”ด LATERAL MOVEMENT:
- SCShell ==> https://lnkd.in/e256fC8B
- MoveKit ==> https://lnkd.in/eR-NUu_U
- ImPacket ==> https://lnkd.in/euG4hTTs

๐Ÿ”ด EXFILTRATION:
- SharpExfiltrate ==> https://lnkd.in/eGC4BKRN
- DNSExfiltrator ==> https://lnkd.in/epJ-s6gp
- Egress-Assess ==> https://lnkd.in/eXGFPQRJ

#redteam #cybersecurity #penetrationtesting #security #ethicalhacking #tools
[ ๐‹๐ˆ๐’๐“ ๐Ž๐… ๐ƒ๐€๐Œ๐ ๐•๐”๐‹๐๐„๐‘๐€๐๐ˆ๐‹๐ˆ๐“๐ˆ๐„๐’ ๐‹๐€๐ ]

Damn Vulnerable Labs (DVL) are a collection of deliberately vulnerable applications and infrastructure that are designed to help security professionals and enthusiasts learn about and practice common security vulnerabilities. DVLs can be used to simulate real-world attacks and to test the effectiveness of security tools and techniques.

#AWSGoat : A Damn Vulnerable AWS Infrastructure
https://lnkd.in/dq2cYPG2

#AzureGoat : A Damn Vulnerable Azure Infrastructure
https://lnkd.in/dKMMrESA

#Webpentest: A Damn Vulnerable Web Application
https://lnkd.in/dNJxX-Fe

#API: A Damn Vulnerable Web Sockets
https://lnkd.in/dMbJgP5h

#Mobile: Damn Vulnerable Hybrid Mobile App
https://lnkd.in/dSMZMuzZ

#CICD: Deliberately vulnerable CI/CD environment
https://lnkd.in/dCxZb88q

#GraphQL: Damn Vulnerable GraphQL Application
https://lnkd.in/d5V6P9HA

#Webservice: Damn Vulnerable Web Services
https://lnkd.in/dAu8HAyd

#VamPI: Vulnerable API
https://lnkd.in/dRPpBNjj

#DVSA: Damn Vulnerable Serverless Application
https://lnkd.in/dnvdNcfq

#DVTA: DVTA is a Vulnerable Thick Client Application
https://lnkd.in/dDhEDgdx

#DVJA: Damn Vulnerable Java Application
https://lnkd.in/dqFyjYWP

#DVID: Damn Vulnerable IoT Device
https://lnkd.in/dNV2RjUj

#DVPWA: Damn Vulnerable Python Web Application
https://lnkd.in/diDvsz8u

#DVAS: Damn Vulnerable Application Scanner
https://lnkd.in/dq_aC4pX

#DVB: Damn Vulnerable Bank
https://lnkd.in/dyGWJzxD

#DVWPS: Damn Vulnerable WordPress Site
https://lnkd.in/dkY-tXHe

#DVNA: Damn Vulnerable NodeJS Application
https://lnkd.in/ds3JReM5

#DVRA: Damn Vulnerable Ruby on Rails
https://lnkd.in/djQ_ehzi

#DVGM: Damn Vulnerable Grade Management
https://lnkd.in/dAepn4K7

#Tiredful
https://lnkd.in/d3NjivMu

#DVCSharp: Damn Vulnerable C# Application
https://lnkd.in/d8cZxdnr

#DVHMA: Damn Vulnerable Hybrid Mobile App
https://lnkd.in/dSMZMuzZ

#DVIA: Damn Vulnerable iOS App
https://lnkd.in/dJqPp-d9

#DVIA2: Damn Vulnerable iOS App 2
https://lnkd.in/dhGUXurv

#DVRF: Damn Vulnerable Router Firmware
https://lnkd.in/dUda_XsF

#DVFaaS: Damn Vulnerable Functions as a Service
https://lnkd.in/drVpszwD

#DVCA: Damn Vulnerable Cloud Application
https://lnkd.in/dPyKYKw4

#cybersecurity #webapplicationsecurity #redteam #blueteam #bugbounty #damnvulnerable #dvwa
[๐…๐‘๐„๐„ ๐‚๐˜๐๐„๐‘ ๐’๐„๐‚๐”๐‘๐ˆ๐“๐˜ ๐‚๐Ž๐”๐‘๐’๐„๐’ ๐˜๐Ž๐” ๐’๐‡๐Ž๐”๐‹๐ƒ ๐ƒ๐Ž ๐‘๐ˆ๐†๐‡๐“ ๐๐Ž๐–]

Penetration Testing Course by TCM Security
https://lnkd.in/eb4ieU7b

Penetration Testing Course by IT Masters (CSU)
https://lnkd.in/ei6RrNXw

Internet of Things Intro by Stanford University
https://lnkd.in/eCrhKFKR

Free Cyber Defense Training by Mandiant (now part of Google Cloud)
https://lnkd.in/eSfbiTeY

Digital Forensic Courses List by DFIRDiva
https://lnkd.in/e4RRihcn

Blue Team Training Course by Security Blue Team
https://lnkd.in/ehwEzNfp

Splunk Free Course by Splunk
https://lnkd.in/e7CP_uqU

Cyber Threat Intelligence 101 by arcX
https://lnkd.in/ePqK-fNN

Cyber Security Free Course by Palo Alto Networks
https://lnkd.in/eiFkSHiK

#threatintelligence #splunk #hacking #redteam #cybersecurity #informationsecurity #pentest #digitalforensic #blueteam
Forwarded from CrackCodes ๐Ÿ‡ฎ๐Ÿ‡ณ (Prapatti ็ˆชใ„šๅ‡ าœ)
๐Ÿ“ŸXavier Marks Indonesian Data Leak : Download

๐Ÿ‘พCVE-2023-34039 Exploit : Download

๐ŸฒCraxs Rat V6.7 : Download

๐Ÿ•ธInvicti Standard V23.9.0.42095 Crack : Download

๐Ÿช…Telegram Bot For Remote Access To Computer Files : Download

๐Ÿ“ฏGet IP Address On Other Side Audio Call In Telegram : Download
Forwarded from CrackCodes ๐Ÿ‡ฎ๐Ÿ‡ณ (Prapatti ็ˆชใ„šๅ‡ าœ)
๐ŸงฎActMobile Networks Data Leak : Download

๐ŸฒInvicta Stealer: A Powerful, Native Stealer : Download

๐Ÿ“ŸGoTTY โ€“ Share Your Terminal As A Web Application : Explore

๐Ÿ‘พJPGtoMalware : Try

๐Ÿ’ŒHeart Sender V4.00.33 Crack : Download

@Crackcodes | Crackcodes.in | System32.ink
๐Ÿ”ด USEFUL WEBSITES FOR PENTESTERS & HACKERS โž•

Exploits Database ๐Ÿ”•
http://www.exploit-db.com/
http://www.intelligentexploit.com
http://www.shodanhq.com/
http://packetstormsecurity.com/

Vulnerabilities Database ๐Ÿน
https://cve.mitre.org/cve/
http://www.cvedetails.com/
https://nvd.nist.gov/
http://osvdb.org/
https://www.kb.cert.org/vuls/
https://secunia.com/community/advisories/search/
http://www.securityfocus.com/bid
http://lwn.net/Vulnerabilities/
http://denimgroup.com/resources-threadfix/
http://www.vulnerability-lab.com
http://www.secdocs.org/

Hacking Tutorials ๐Ÿ’ป
https://www.offensive-security.com/
http://www.kalitutorials.net/2013/08/kali-linux.html
https://www.youtube.com/user/DEFCONConference
https://www.youtube.com/user/Hak5Darren
https://www.youtube.com/user/sansinstitute
https://en.wikibooks.org/wiki/Metasploit/VideoTutorials
http://www.hacking-tutorial.com/
http://breakthesecurity.cysecurity.org/
http://www.securitytube.net/
http://www.ehacking.net/
https://vimeo.com/channels/fullscopesecurity
http://www.spacerogue.net/wordpress/

Virus Scan ๐Ÿ‘โ€๐Ÿ—จ
https://www.virustotal.com/nl/
http://anubis.iseclab.org/
http://virusscan.jotti.org/it
--Not distribute to AV--
http://v2.scan.majyx.net/?page=home
http://fuckingscan.me/
https://anonscanner.com/
http://nodistribute.com/
http://www.file2scan.net/

Tools Download ๐Ÿ› 
http://tools.kali.org/tools-listing
http://insecure.org/
http://www.hackersonlineclub.com/hacking-tools
https://www.concise-courses.com/hacking-tools/
http://www.darknet.org.uk/category/hacking-tools/
http://www.kitploit.com/
http://www.toolswatch.org/
http://www.blackarch.org/tools.html
https://pentest-tools.com/reconnaissance/google-hacking
https://gexos.github.io/Hacking-Tools-Repository/
http://www.romhacking.net/utilities/

Network Online Tools ๐ŸŒ
http://www.yougetsignal.com/
http://www.dnswatch.info/
http://www.nirsoft.net/countryip/
http://www.tcpiputils.com/
http://www.coffer.com/mac_find/
http://bgp.he.net/
http://www.sockets.com/services.htm
http://services.ce3c.be/ciprg/

IP Lookup ๐Ÿ”
http://ip-api.com/#
http://www.my-ip-neighbors.com/
http://www.whatismyip.com/
http://www.ip2location.com/demo
http://freegeoip.net/static/index.html
http://whatstheirip.com
http://ipaddress.com
http://www.ip-adress.com/ipaddresstolocation/

Encrypt / Decrypt โœˆ๏ธ
http://crypo.in.ua/tools/
http://www.tools4noobs.com/online_tools/decrypt/
http://codebeautify.org/encrypt-decrypt
http://textmechanic.com/Encryption-Generator.html
http://www.yellowpipe.com/yis/tools/encrypter/

Online Hash Crackers ๐Ÿ’ฅ
http://www.hashkiller.co.uk/
http://www.md5online.org/
http://www.cmd5.org/
http://www.md5crack.com/
http://www.netmd5crack.com/cracker/
http://md5decryption.com/
http://md5.rednoize.com/
http://www.md5this.com/index.php
http://www.tydal.nu/article/md5-crack/
http://passcracking.com/
https://hdb.insidepro.com/en
https://crackstation.net/
http://www.cloudcracker.net/
https://isc.sans.edu/tools/reversehash.html
http://www.onlinehashcrack.com/ [$]
http://hashcrack.in/en [$]

File Upload ๐Ÿ•“
https://mega.co.nz/
https://www.mediafire.com/
https://infotomb.com/m/welcome
http://sharesend.com/
http://www.wss-coding.com/upload
http://zippyshare.com/
http://filetolink.com/
http://ge.tt/
http://largedocument.com/
http://rghost.net/
http://dox.abv.bg/files/share
http://secureupload.eu/

Anonymous Test ๐Ÿ‘บ
https://ipleak.net/
https://www.dnsleaktest.com/
https://diafygi.github.io/webrtc-ips/

Torcheck โœ…
http://5deqglhxcoy3gbx6.onion - Xenobite
http://tmkloc6vhxos3nde.onion

SMS ๐Ÿดโ€โ˜ ๏ธ
http://receive-sms-now.com/
http://www.receive-sms-online.info/
http://www.receivesmsonline.net/

Fake Identity ๐Ÿ”ก
http://www.fakenamegenerator.com/
https://fakena.me/
http://names.igopaygo.com/people/fake_person

Posted by ๐Ÿ’Ž@TheGodEye๐Ÿ’Ž
Shell ๐Ÿš

๐Ÿ”น Goshell 
๐Ÿ”—https://github.com/eze-kiel/goshell

๐Ÿ”นPrint-My-Shell
๐Ÿ”—https://github.com/sameera-madushan/Print-My-Shell

๐Ÿ”นReverse-shell-generator
๐Ÿ”—https://github.com/0dayCTF/reverse-shell-generator

๐Ÿ”นGirsh
๐Ÿ”—https://github.com/nodauf/Girsh

๐Ÿ”น Blueshell
๐Ÿ”—https://github.com/whitehatnote/BlueShell

๐Ÿ”นClink
๐Ÿ”—http://mridgers.github.io/clink/

๐Ÿ”นNatpass
๐Ÿ”—https://github.com/jkstack/natpass

๐Ÿ”นPlatypus
๐Ÿ”—https://github.com/WangYihang/Platypus

๐Ÿ”นshells
๐Ÿ”—https://github.com/4ndr34z/shells/

๐Ÿ”นReverse_ssh
๐Ÿ”—https://github.com/NHAS/reverse_ssh

๐Ÿ”นHoaxshell
๐Ÿ”—https://github.com/t3l3machus/hoaxshell
Media is too big
VIEW IN TELEGRAM
๐Ÿ’ปComplete Bash shell scripting๐Ÿ’ป

๐Ÿ’ป๐Ÿ’ปDuration:- 10hr
Happy Ganesh Chaturthi To Everyone โค๏ธ
Forwarded from CrackCodes ๐Ÿ‡ฎ๐Ÿ‡ณ (HackLock)
CDI TEAM ON WHATSAP CHANNEL

IN THIS CHANNEL WE WILL PROVIDE YOU GUYS

๐Ÿ‘‰๐Ÿป CODING TUTORIALS AND HACKING TUTORIALS

๐Ÿ‘‰๐Ÿป WEBINARS

๐Ÿ‘‰๐Ÿป GIVEAWAYS AND TIPS AND TRICKS

๐Ÿ‘‰๐Ÿป HANDWRITTEN NOTES

AND MANY MORE STUFF...

LINK :
https://whatsapp.com/channel/0029Va9JObd7j6gBzbQybW3r

DON'T FORGET TO SHARE IT WITH YOUR FRIENDS

โค๏ธ JAY SHREE RAAM โค๏ธ