Error_code๐Ÿ‡ช๐Ÿ‡น๐Ÿ‘จโ€๐Ÿ’ป
58 subscribers
43 photos
22 videos
8 files
54 links
Best channel for programmer to get program related tips and tricks..๐Ÿ‡ช๐Ÿ‡น๐Ÿ‡ช๐Ÿ‡น๐Ÿ’ป
๐Ÿ‘จโ€๐Ÿ’ปcyber security basics๐Ÿ•ธ
๐Ÿ‘จโ€๐Ÿ’ปpenetration testing tutorialsโš–๏ธ
๐Ÿ‘จโ€๐Ÿ’ปlinux tutorials๐Ÿ’ด
Download Telegram
Where can I edit/create HTML files?
In a text editor! Creating HTML files is free you don't need to download expensive applications to do so.
Look at the list below for some free apps you could use to edit HTML files.
โ€ข Notepad โ€ข Notepad++ โ€ข TextEdit โ€ข Sublime Text Editor โ€ข VIM
ATOM โ€ข Visual Studio Code โ€ข Brackets โ€ข Quoda (Android app) โ€ข QuickEdit (Android app) โ€ข DroidEdit (Android app) โ€ข HTML Editor (Android app)
Dcoder (Android app) โ€ข This app! We have a micro code-editor with syntax highlighting
and can save and open HTML Files.
Those are the most commonly used text editors for creating html files.
You can download any application you want.
Saving HTML Files
You need to save your HTML files with the .html file extension. For example, mywebpage.html.
If you don't save your files with the .html file extension, you won't be able to run it on browsers.
<p> Hello world! </p>
TRY IT YOURSELF
HTML แ‹แ‹ญแˆŽแ‰ฝแŠ• แ‹จแ‰ต แАแ‹D แˆ›แˆญแ‰ตแ‹•/แˆ˜แแŒ แˆญ แ‹จแˆแ‰ฝแˆˆแ‹?
แ‰ แŒฝแˆ‘แ แŠ แˆญแ‰ณแŠข แ‹แˆตแŒฅ! แ‹จแŠคแ‰ฝแ‰ฒแŠคแˆแŠคแˆ แ‹แ‹ญแˆŽแ‰ฝแŠ• แˆ˜แแŒ แˆญ แАแƒ แАแ‹ แฃ แ‹ญแˆ…แŠ•แŠ• แˆˆแˆ›แ‹ตแˆจแŒ แ‹แ‹ต แˆ˜แ‰ฐแŒแ‰ แˆชแ‹ซแ‹Žแ‰ฝแŠ• แˆ›แ‹แˆจแ‹ต แŠ แ‹ซแˆตแˆแˆแŒแ‹Žแ‰ตแˆแข
แŠคแ‰ฝแ‰ฒแŠคแˆแŠคแˆ แ‹แ‹ญแˆŽแ‰ฝแŠ• แˆˆแˆ›แˆญแ‰ตแ‹• แˆŠแŒ แ‰€แˆ™แ‰ฃแ‰ธแ‹ แˆˆแˆšแ‰ฝแˆ‰ แŠ แŠ•แ‹ณแŠ•แ‹ต แАแƒ แˆ˜แ‰ฐแŒแ‰ แˆชแ‹ซแ‹Žแ‰ฝ แŠจแ‹šแˆ… แ‰ แ‰ณแ‰ฝ แ‹ซแˆˆแ‹แŠ• แ‹แˆญแ‹แˆญ แ‹ญแˆ˜แˆแŠจแ‰ฑแข
โ€ข แˆ›แˆตแ‰ณแ‹ˆแˆป แ‹ฐแ‰ฅแ‰ฐแˆญ โ€ข แ‹จแˆ›แˆตแ‰ณแ‹ˆแˆป แ‹ฐแ‰ฅแ‰ฐแˆญ++ โ€ข TextEdit โ€ข Sublime Text Editor โ€ข VIM
ATOM โ€ข แ‰ชแ‹ฅแ‹‹แˆ แˆตแ‰ฑแ‹ฒแ‹ฎ แŠฎแ‹ต โ€ข แ‰…แŠ•แŽแ‰ฝ โ€ข แŠฉแ‹ณ (แŠ แŠ•แ‹ตแˆฎแ‹ญแ‹ต แˆ˜แ‰ฐแŒแ‰ แˆชแ‹ซ) โ€ข QuickEdit (แŠ แŠ•แ‹ตแˆฎแ‹ญแ‹ต แˆ˜แ‰ฐแŒแ‰ แˆชแ‹ซ) โ€ข DroidEdit (แŠ แŠ•แ‹ตแˆฎแ‹ญแ‹ต แˆ˜แ‰ฐแŒแ‰ แˆชแ‹ซ) โ€ข HTML แŠ แˆญแ‰ณแ‹’ (แŠ แŠ•แ‹ตแˆฎแ‹ญแ‹ต แˆ˜แ‰ฐแŒแ‰ แˆชแ‹ซ)
แ‹ฒแŠฎแ‹ฐแˆญ (แŠ แŠ•แ‹ตแˆฎแ‹ญแ‹ต แˆ˜แ‰ฐแŒแ‰ แˆชแ‹ซ) โ€ข แ‹ญแˆ… แˆ˜แ‰ฐแŒแ‰ แˆชแ‹ซ! แŠ แŒˆแ‰ฃแ‰ฅ แ‹จแˆšแ‹ซแŒŽแˆ‹ แ‹จแˆ›แ‹ญแŠญแˆฎ แŠฎแ‹ต แŠ แˆญแ‰ณแ‹’ แŠ แˆˆแŠ•แข
แŠฅแŠ“ HTML แ‹แ‹ญแˆŽแ‰ฝแŠ• แˆ›แˆตแ‰€แˆ˜แŒฅ แŠฅแŠ“ แˆ˜แŠญแˆแ‰ต แ‹ญแ‰ฝแˆ‹แˆแข
แŠคแ‰ฝแ‰ฒแŠคแˆแŠคแˆ แ‹แ‹ญแˆŽแ‰ฝแŠ• แˆˆแˆ˜แแŒ แˆญ แ‰ แ‰ฅแ‹›แ‰ต แ‹จแˆšแŒ แ‰€แˆ™แ‰ฃแ‰ธแ‹ แ‹จแŒฝแˆ‘แ แŠ แˆญแ‰ณแŠขแ‹Žแ‰ฝ แŠ“แ‰ธแ‹แข
แ‹จแˆšแˆแˆแŒ‰แ‰ตแŠ• แˆ˜แ‰ฐแŒแ‰ แˆชแ‹ซ แˆ›แ‹แˆจแ‹ต แ‹ญแ‰ฝแˆ‹แˆ‰แข
HTML แ‹แ‹ญแˆŽแ‰ฝแŠ• แ‰ แˆ›แˆตแ‰€แˆ˜แŒฅ แˆ‹แ‹ญ
แ‹จแŠคแ‰ฝแ‰ฒแŠคแˆแŠคแˆ แ‹แ‹ญแˆŽแ‰ฝแˆ…แŠ• แ‰ .html แ‹แ‹ญแˆ แ‰…แŒฅแ‹ซ แˆ›แˆตแ‰€แˆ˜แŒฅ แŠ แˆˆแ‰ฅแˆ…แข แˆˆแˆแˆณแˆŒแฃ mywebpage.htmlแข
แ‹แ‹ญแˆŽแ‰ฝแˆ…แŠ• แ‰ .html แ‹แ‹ญแˆ แ‰…แŒฅแ‹ซ แŠซแˆ‹แˆตแ‰€แˆ˜แŒฅแŠญ แ‰ แŠ แˆณแˆน แˆ‹แ‹ญ แˆ›แˆตแŠฌแ‹ต แŠ แ‰ตแ‰ฝแˆแˆแข
<p> แˆฐแˆ‹แˆ แŠ แˆˆแˆ! </p>
แŠฅแˆซแˆตแ‹Ž แ‹ญแˆžแŠญแˆฉแ‰ตแข
แŠฅแАแ‹šแˆ…แŠ• แ‹ฐแˆจแŒƒแ‹Žแ‰ฝ แ‰ แˆ˜แŠจแ‰ฐแˆ แŠฅแŠ•แˆžแŠญแˆจแ‹แก-
1. แŠจแˆ‹แ‹ญ แ‹ซแˆˆแ‹แŠ• แŠฅแˆซแˆตแ‹Ž แ‹ญแˆžแŠญแˆฉแ‰ต แ‹จแˆšแˆˆแ‹แŠ• แ‰แˆแ แŒ แ‰… แ‹ซแ‹ตแˆญแŒ‰แข 2. แ‰ แˆ‹แ‹ญแŠ›แ‹ แ‰€แŠ แŒฅแŒ แˆ‹แ‹ญ แ‹ซแˆˆแ‹แŠ• แ‹จแˆแŠ“แˆŒ แŠ แ‹ถ แŒ แ‰… แ‹ซแ‹ตแˆญแŒ‰แข 3. แŠ แˆตแ‰€แˆแŒฅ แŠฅแŠ•แ‹ฐ แ‹จแˆšแˆˆแ‹แŠ• แŒ แ‰… แ‹ซแ‹ตแˆญแŒ‰แข 4. แ‰ แ‰ฐแˆฐแŒ แ‹ แˆ˜แˆตแŠญ แˆ‹แ‹ญ mywebpage.html แ‹ญแ‰ฐแ‹ญแ‰ก. 5. แŠ แˆตแ‰€แˆแŒฅ แ‹จแˆšแˆˆแ‹แŠ• แŒ แ‰… แ‹ซแ‹ตแˆญแŒ‰แข
แˆแŠญ แŠฅแŠ•แ‹ฐแ‹› แ‰€แˆ‹แˆแฃ แ‹จแŠฅแˆญแˆตแ‹Ž HTML แ‹แ‹ญแˆ แ‰ฐแ‰€แˆแŒงแˆแข
:: แŠ แ‹Ž! แŠคแ‰ฝแ‰ฒแŠคแˆแŠคแˆ แ‹แ‹ญแˆŽแ‰ฝแŠ• แˆˆแˆ˜แแŒ แˆญ แ‰ฐแŠ•แ‰€แˆณแ‰ƒแˆฝ แˆ˜แˆณแˆชแ‹ซแ‹Žแ‰ฝแŠ• แˆ˜แŒ แ‰€แˆ แ‹ญแ‰ฝแˆ‹แˆ‰แข
Hashcat is a password recovery tool. It had a proprietary code base until 2015, but was then released as open source software. Versions are available for Linux, OS X, and Windows. Examples of hashcat-supported hashing algorithms are LM hashes, MD4, MD5, SHA-family and Unix Crypt formats as well as algorithms used in MySQL and Cisco PIX.
The Metasploit Project is a computer security project that provides information about security vulnerabilities and aids in penetration testing and IDS signature development. It is owned by Boston, Massachusetts-based security company Rapid7.

Its best-known sub-project is the open-source[2] Metasploit Framework, a tool for developing and executing exploit code against a remote target machine. Other important sub-projects include the Opcode Database, shellcode archive and related research.

The Metasploit Project includes anti-forensic and evasion tools, some of which are built into the Metasploit Framework. Metasploit is pre-installed in the Kali Linux operating system.
John the Ripper password cracker
John the Ripper is an Open Source password security auditing and password recovery tool available for many operating systems. John the Ripper jumbo supports hundreds of hash and cipher types, including for: user passwords of Unix flavors (Linux, *BSD, Solaris, AIX, QNX, etc.), macOS, Windows, "web apps" (e.g., WordPress), groupware (e.g., Notes/Domino), and database servers (SQL, LDAP, etc.); network traffic captures (Windows network authentication, WiFi WPA-PSK, etc.); encrypted private keys (SSH, GnuPG, cryptocurrency wallets, etc.), filesystems and disks (macOS .dmg files and "sparse bundles", Windows BitLocker, etc.), archives (ZIP, RAR, 7z), and document files (PDF, Microsoft Office's, etc.) These are just some of the examples - there are many more.

Hash Suite for Android - free password hash cracker in your pocket
John the Ripper is free and Open Source software, distributed primarily in source code form.
sqlmap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of database servers. It comes with a powerful detection engine, many niche features for the ultimate penetration tester and a broad range of switches lasting from database fingerprinting, over data fetching from the database, to accessing the underlying file system and executing commands on the operating system via out-of-band connections.
Ettercap is a free and open source network security tool for man-in-the-middle attacks on LAN. It can be used for computer network protocol analysis and security auditing. It runs on various Unix-like operating systems including Linux, Mac OS X, BSD and Solaris, and on Microsoft Windows. It is capable of intercepting traffic on a network segment, capturing passwords, and conducting active eavesdropping against a number of common protocols. Its original developers later founded Hacking Team.
Error_code๐Ÿ‡ช๐Ÿ‡น๐Ÿ‘จโ€๐Ÿ’ป
base.apk
Penetration testing, also known as pen testing, security pen testing, and security testing, is a form of ethical hacking. It describes the intentional launching of simulated cyberattacks by โ€œwhite hatโ€ penetration testers using strategies and tools designed to access or exploit computer systems, networks, websites, and applications. Although the main objective of pen testing is to identify exploitable issues so that effective security controls can be implemented, security professionals can also use penetration testing techniques, along with specialized testing tools, to test the robustness of an organization's security policies, its regulatory compliance, its employees' security awareness, and the organization's ability to identify and respond to security issues and incidents such as unauthorized access, as they occur.
Fern Wifi Cracker is a Wireless security auditing and attack software program written using the Python Programming Language and the Python Qt GUI library, the program is able to crack and recover WEP/WPA/WPS keys and also run other network based attacks on wireless or ethernet based networks.

Fern Wifi Cracker - Wireless Security Auditing Tool
The Software runs on any Linux machine with prerequisites installed, and it has been tested on Ubuntu KDE/Gnome, BackTrack Linux and BackBox Linux.
Nmap is a network scanner created by Gordon Lyon. Nmap is used to discover hosts and services on a computer network by sending packets and analyzing the responses. Nmap provides a number of features for probing computer networks, including host discovery and service and operating system detection
What is Nessus?

Nessus is a remote security scanning tool, which scans a computer and raises an alert if it discovers any vulnerabilities that malicious hackers could use to gain access to any computer you have connected to a network. It does this by running over 1200 checks on a given computer, testing to see if any of these attacks could be used to break into the computer or otherwise harm it.

Who would use a tool like this?

If you are an administrator in charge of any computer (or group of computers) connected to the internet, Nessus is a great tool help keep their domains free of the easy vulnerabilities that hackers and viruses commonly look to exploit.
Whonix is an operating system focused on anonymity, privacy and security. It's based on the Tor anonymity network, Debian GNU/Linux and security by isolation. DNS leaks are impossible, and not even malware with root privileges can find out the user's real IP.
Qubes OS
[Qubes OS]

Qubes OS is a free and open source operating system uniquely designed to protect the security and privacy of the user. Its architecture is built to enable the user to define different security environments ("qubes") on their computer and visually manage their interaction with each other and the world. This project will improve the usability of Qubes OS by: (1) reviewing and integrating already existing community-created usability improvements, (2) implementing a localization strategy for the OS and its documentation, and (3) creating a holistic approach for improved accessibility
BlackArch is a penetration testing distribution based on Arch Linux that provides a large amount of cyber security tools. It is an open-source distro created specially for penetration testers and security researchers. The repository contains more than 2700 tools that can be installed individually or in groups. BlackArch Linux is compatible with existing Arch Linux installs.
BackBox is more than an operating system, it is a Free Open Source Community Project with the aim of promoting the culture of security in IT environment and give its contribution to make it better and safer. All this using exclusively Free Open Source Software, demonstrating the potential and power of the Community. If youโ€™d like to know more feel free to navigate in our web site and get in touch with us.