Flyhawk Robospace
Official Site : Click Here
About Live Courses : Ckick Here
Basic Programming and Satellite Building : Click Here
Starts Oct 29
1,499 Indian rupees
₹1,499
Basics of SATELLITE building : Click Here
Starts Nov 5
899 Indian rupees
₹899
Basics of Arduino Programming : Click Here
Starts Oct 29
699 Indian rupees
₹699
Telegram Support : @robospaceevents
Note : no limit of participation, just need knowledge of python and basic robotics
anyone can join here
Official Site : Click Here
About Live Courses : Ckick Here
Basic Programming and Satellite Building : Click Here
Starts Oct 29
1,499 Indian rupees
₹1,499
Basics of SATELLITE building : Click Here
Starts Nov 5
899 Indian rupees
₹899
Basics of Arduino Programming : Click Here
Starts Oct 29
699 Indian rupees
₹699
Telegram Support : @robospaceevents
Note : no limit of participation, just need knowledge of python and basic robotics
anyone can join here
https://www.linkedin.com/company/cybritexsecurity
FOLLOW ––>
CYBRITEX SECURITY
AT LINKEDIN TO GET MORE CONTENTS RELATED TECH & CYBER-SECURITY 😃
FOLLOW ––>
CYBRITEX SECURITY
AT LINKEDIN TO GET MORE CONTENTS RELATED TECH & CYBER-SECURITY 😃
Here we write a article about Social engineering in cyber security in depth
Article link - https://freelearningtech.in/social-engineering-in-cyber-security-2021/
May be its helpful for you Share and support us ❤️❤️❤️
❤️❤️ Enjoy and Share ❤️❤️
Support Us ❤️
Channel : @freelearningtech
Group : @freelearningtech21
Website : https://freelearningtech.in/
Article link - https://freelearningtech.in/social-engineering-in-cyber-security-2021/
May be its helpful for you Share and support us ❤️❤️❤️
❤️❤️ Enjoy and Share ❤️❤️
Support Us ❤️
Channel : @freelearningtech
Group : @freelearningtech21
Website : https://freelearningtech.in/
https://twitter.com/cybritexsec
FOLLOW ––>
CYBRITEX SECURITY
AT TWITTER TO GET MORE CONTENTS RELATED TECH & CYBER-SECURITY 😃
FOLLOW ––>
CYBRITEX SECURITY
AT TWITTER TO GET MORE CONTENTS RELATED TECH & CYBER-SECURITY 😃
Twitter
Cybritex Security (@cybritexsec) | Twitter
The latest Tweets from Cybritex Security (@cybritexsec). A CYBER-SECURITY COMPANY.
It is an E-Learning Platform to enhance your knowledge and Skills in #cybersecurity and #Tech. India
It is an E-Learning Platform to enhance your knowledge and Skills in #cybersecurity and #Tech. India
Before you read this post first you read our other three posts because our all posts are linked with each other.
Post 1 - https://t.me/freelearningtech/304
Post 2 - https://t.me/freelearningtech/311
Post 3 - https://t.me/freelearningtech/319
Here we will tell you How to find vulnerabilities in a Website. We will clear one thing gf tool will help you for finding that urls where you can try for finding different type of vulnerabilities.
Like this you can check what type of vulnerability finding vai gf tool
Command - gf -list
It's your choice you can also use workingsubdomain.txt file if you want here we have used wayback.txt file for example.
How to Find that url Where you can try XSS vulnerability.
Command - cat wayback.txt | gf xss | tee -a /root/Desktop/gfxss.txt (put a path where you can save output)
How to Find that url Where you can try SQL Injection vulnerability.
Command - cat wayback.txt | gf sqli | tee -a /root/Desktop/gfsqli.txt (put a path where you can save output)
How to Find that url Where you can try IDOR vulnerability.
Command - cat wayback.txt | gf idor | tee -a /root/Desktop/gfidor.txt (put a path where you can save output)
How to Find that url Where you can try SSRf vulnerability.
Command - cat wayback.txt | gf ssrf | tee -a /root/Desktop/gfssrf.txt (put a path where you can save output)
Tool Link - https://github.com/1ndianl33t/Gf-Patterns
Click on tool link here you get full guidance for using gf tool
How to grep js files for your subdomains list.
Command - cat wayback.txt | grep js | tee -a /root/Desktop/jsfiles.txt (put a path where you can save output)
Waiting for our Next post❤️❤️❤️❤️
May be its helpful for you Share and support us ❤️❤️❤️
❤️❤️ Enjoy and Share ❤️❤️
Support Us ❤️
Channel : @freelearningtech
Group : @freelearningtech21
Website : https://freelearningtech.in/
Post 1 - https://t.me/freelearningtech/304
Post 2 - https://t.me/freelearningtech/311
Post 3 - https://t.me/freelearningtech/319
Here we will tell you How to find vulnerabilities in a Website. We will clear one thing gf tool will help you for finding that urls where you can try for finding different type of vulnerabilities.
Like this you can check what type of vulnerability finding vai gf tool
Command - gf -list
It's your choice you can also use workingsubdomain.txt file if you want here we have used wayback.txt file for example.
How to Find that url Where you can try XSS vulnerability.
Command - cat wayback.txt | gf xss | tee -a /root/Desktop/gfxss.txt (put a path where you can save output)
How to Find that url Where you can try SQL Injection vulnerability.
Command - cat wayback.txt | gf sqli | tee -a /root/Desktop/gfsqli.txt (put a path where you can save output)
How to Find that url Where you can try IDOR vulnerability.
Command - cat wayback.txt | gf idor | tee -a /root/Desktop/gfidor.txt (put a path where you can save output)
How to Find that url Where you can try SSRf vulnerability.
Command - cat wayback.txt | gf ssrf | tee -a /root/Desktop/gfssrf.txt (put a path where you can save output)
Tool Link - https://github.com/1ndianl33t/Gf-Patterns
Click on tool link here you get full guidance for using gf tool
How to grep js files for your subdomains list.
Command - cat wayback.txt | grep js | tee -a /root/Desktop/jsfiles.txt (put a path where you can save output)
Waiting for our Next post❤️❤️❤️❤️
May be its helpful for you Share and support us ❤️❤️❤️
❤️❤️ Enjoy and Share ❤️❤️
Support Us ❤️
Channel : @freelearningtech
Group : @freelearningtech21
Website : https://freelearningtech.in/
Telegram
Freelearningtech
Here we share now How to do Bug hunting step wise checked pinned messages regularly
Bug hunting Step one Choose your Target which have huge list of subdomains and subdomains is eligible in Scope
Like you have seen a two targets
1. www.example.com
Another…
Bug hunting Step one Choose your Target which have huge list of subdomains and subdomains is eligible in Scope
Like you have seen a two targets
1. www.example.com
Another…
Freelearningtech pinned «Before you read this post first you read our other three posts because our all posts are linked with each other. Post 1 - https://t.me/freelearningtech/304 Post 2 - https://t.me/freelearningtech/311 Post 3 - https://t.me/freelearningtech/319 Here we will…»
https://medium.com/analytics-vidhya/a-beginners-guide-to-cyber-security-3d0f7891c93a
❤️❤️ Enjoy and Share ❤️❤️
Support Us ❤️
Channel : @freelearningtech
Group : @freelearningtech21
Website : https://freelearningtech.in/
❤️❤️ Enjoy and Share ❤️❤️
Support Us ❤️
Channel : @freelearningtech
Group : @freelearningtech21
Website : https://freelearningtech.in/
Medium
A Beginner’s Guide to Cyber Security
We will be covering the following topics:
https://medium.com/bug-bounty-hunting/facebook-bug-invite-user-to-like-a-page-even-after-they-decline-the-page-like-invite-f83d9ec845b3
❤️❤️ Enjoy and Share ❤️❤️
Support Us ❤️
Channel : @freelearningtech
Group : @freelearningtech21
Website : https://freelearningtech.in/
❤️❤️ Enjoy and Share ❤️❤️
Support Us ❤️
Channel : @freelearningtech
Group : @freelearningtech21
Website : https://freelearningtech.in/
Medium
Facebook Bug:Invite user to Like a Page even after they decline the Page Like Invite
The bug makes it possible to again and again notify a fb user (friend) and send him page invite request even after he has “declined” the…
https://medium.com/bug-bounty-hunting/aws-top-10-vulnerabilities-fe5fa93bac64
❤️❤️ Enjoy and Share ❤️❤️
Support Us ❤️
Channel : @freelearningtech
Group : @freelearningtech21
Website : https://freelearningtech.in/
❤️❤️ Enjoy and Share ❤️❤️
Support Us ❤️
Channel : @freelearningtech
Group : @freelearningtech21
Website : https://freelearningtech.in/
Medium
AWS Top 10 Vulnerabilities
This contains the labs for top 10 aws security vulnerabilities and increases info about cloud security.
https://www.linkedin.com/posts/cybritexsecurity_cybersecurity-cyber-security-activity-6856958661068230656-m1aI
Skills To Acquire in Cybersecurity...
Must Check Out ✔
Skills To Acquire in Cybersecurity...
Must Check Out ✔
https://blog.intigriti.com/2021/10/05/hacker-tools-crlfuzz/?cn-reloaded=1
❤️❤️ Enjoy and Share ❤️❤️
Support Us ❤️
Channel : @freelearningtech
Group : @freelearningtech21
Website : https://freelearningtech.in/
❤️❤️ Enjoy and Share ❤️❤️
Support Us ❤️
Channel : @freelearningtech
Group : @freelearningtech21
Website : https://freelearningtech.in/
Intigriti
CRLFuzz - Hacker Tools: Injecting CRLF for bounties 👩💻 - Intigriti
A CRLF injection is the injection of newlines in places where the server doesn't expect newlines. Let's look at CRLFuzz, a tool to find them!
https://therecord.media/researcher-discloses-iphone-lock-screen-bypass-on-ios-15-launch-day/
❤️❤️ Enjoy and Share ❤️❤️
Support Us ❤️
Channel : @freelearningtech
Group : @freelearningtech21
Website : https://freelearningtech.in/
❤️❤️ Enjoy and Share ❤️❤️
Support Us ❤️
Channel : @freelearningtech
Group : @freelearningtech21
Website : https://freelearningtech.in/
The Record
Researcher discloses iPhone lock screen bypass on iOS 15 launch day
On the day Apple released iOS 15, a Spanish security researcher disclosed an iPhone lock screen bypass that can be exploited to grant attackers access to a user's notes.
https://infosecwriteups.com/into-the-art-of-binary-exploitation-0x000001-stack-based-overflow-50fe48d58f10
❤️❤️ Enjoy and Share ❤️❤️
Support Us ❤️
Channel : @freelearningtech
Group : @freelearningtech21
Website : https://freelearningtech.in/
❤️❤️ Enjoy and Share ❤️❤️
Support Us ❤️
Channel : @freelearningtech
Group : @freelearningtech21
Website : https://freelearningtech.in/
Medium
Into the art of Binary Exploitation 0x000001 [Stack-Based Overflow]
Dear Fellow hackers & info-sec hobbyists ✋🏻
Jason Haddix is a Famous Bug Hunter and He Shared our Bug hunting Methodology V4
Article Link - https://freelearningtech.in/jhaddix-bug-bounty-methodology-v4/
❤️❤️ Enjoy and Share ❤️❤️
Support Us ❤️
Channel : @freelearningtech
Group : @freelearningtech21
Website : https://freelearningtech.in/
Article Link - https://freelearningtech.in/jhaddix-bug-bounty-methodology-v4/
❤️❤️ Enjoy and Share ❤️❤️
Support Us ❤️
Channel : @freelearningtech
Group : @freelearningtech21
Website : https://freelearningtech.in/
Before you read this post first you read our other posts because our all posts are linked with each other.
Post 1 - https://t.me/freelearningtech/304
Post 2 - https://t.me/freelearningtech/311
Post 3 - https://t.me/freelearningtech/319
Post 4 - https://t.me/freelearningtech/349
Here we will tell you Github Recon. Github Recon is very helpful in Bug Hunting. Here we will explain about Github Recon.
Article Link - https://freelearningtech.in/github-dorking-and-github-recon/
Here we will tell you about githound tool First you save your github username and password in config file like this
Config file link - https://github.com/tillson/git-hound/blob/master/config.example.yml
# Required
github_username: "tillson"
github_password: "a8ueifjq4jkasdfoiulk"
# Optional
github_totp_seed: "ABCDEF1234567890" # Obtained via https://github.com/settings/two_factor_authentication/verify
Command - git-hound --workingsubdomain-file /root/Desktop/githubresults.txt (put a path where you can save output)
Tool Link - https://github.com/tillson/git-hound
Second Tool Link - https://github.com/obheda12/GitDorker
If you got any problem for using then leave comment we will help you
Waiting for our Next Post
Thankyou............
❤️❤️ Enjoy and Share ❤️❤️
Support Us ❤️
Channel : @freelearningtech
Group : @freelearningtech21
Website : https://freelearningtech.in/
Post 1 - https://t.me/freelearningtech/304
Post 2 - https://t.me/freelearningtech/311
Post 3 - https://t.me/freelearningtech/319
Post 4 - https://t.me/freelearningtech/349
Here we will tell you Github Recon. Github Recon is very helpful in Bug Hunting. Here we will explain about Github Recon.
Article Link - https://freelearningtech.in/github-dorking-and-github-recon/
Here we will tell you about githound tool First you save your github username and password in config file like this
Config file link - https://github.com/tillson/git-hound/blob/master/config.example.yml
# Required
github_username: "tillson"
github_password: "a8ueifjq4jkasdfoiulk"
# Optional
github_totp_seed: "ABCDEF1234567890" # Obtained via https://github.com/settings/two_factor_authentication/verify
Command - git-hound --workingsubdomain-file /root/Desktop/githubresults.txt (put a path where you can save output)
Tool Link - https://github.com/tillson/git-hound
Second Tool Link - https://github.com/obheda12/GitDorker
If you got any problem for using then leave comment we will help you
Waiting for our Next Post
Thankyou............
❤️❤️ Enjoy and Share ❤️❤️
Support Us ❤️
Channel : @freelearningtech
Group : @freelearningtech21
Website : https://freelearningtech.in/
Telegram
Freelearningtech
Here we share now How to do Bug hunting step wise checked pinned messages regularly
Bug hunting Step one Choose your Target which have huge list of subdomains and subdomains is eligible in Scope
Like you have seen a two targets
1. www.example.com
Another…
Bug hunting Step one Choose your Target which have huge list of subdomains and subdomains is eligible in Scope
Like you have seen a two targets
1. www.example.com
Another…
Freelearningtech pinned «Before you read this post first you read our other posts because our all posts are linked with each other. Post 1 - https://t.me/freelearningtech/304 Post 2 - https://t.me/freelearningtech/311 Post 3 - https://t.me/freelearningtech/319 Post 4 - https:…»
Freelearningtech pinned «Can we send here different working subdomains list for bug hunting.»
DETAILS FOR WEBINAR
TOPIC : OSINT
DATE : 24-10-21
TIME : 12 PM
CLASS WILL BE THROUGH : ZOOM
LANGUAGE : HINDI
CLASS LINK : WE WILL PROVIDE YOU TELEGRAM CHANNEL
https://t.me/hackingmaster_t56
TOPIC : OSINT
DATE : 24-10-21
TIME : 12 PM
CLASS WILL BE THROUGH : ZOOM
LANGUAGE : HINDI
CLASS LINK : WE WILL PROVIDE YOU TELEGRAM CHANNEL
https://t.me/hackingmaster_t56
Telegram
hackingmaster_t56
Official channel of @hackingmaster_t56
Group dedicated to Ethical hacking, Cyber Security, Information Security Etc.
All In One Link
https://linktr.ee/hackingmaster_t56
Owner/Admin/moderators are NOT responsible for any cyber crime violations.
Group dedicated to Ethical hacking, Cyber Security, Information Security Etc.
All In One Link
https://linktr.ee/hackingmaster_t56
Owner/Admin/moderators are NOT responsible for any cyber crime violations.