Freelearningtech
728 subscribers
296 photos
45 videos
163 files
1.21K links
Freelearningtech Is A Platform For Cybersecurity (Hacking), Networking, Digital Marketing, IT Courses... And Many More.

https://linktr.ee/freelearningtech

 
Download Telegram
Freelearningtech pinned «we give you some tips related to cross site scripting tips. It happens many times when we try more cross site scripting payloads on a website, in such a website, we block the browser, in such a way, you clear the cookies of the browser. If you search this…»
Freelearningtech pinned «i am sure You have listen about whois but here we will tell you about Reverse Whois. For Reverse WHOIS you can use whoxy website, as we are running the target of google ,there will also be the owner of google, whose name you will get from google, find other…»
Freelearningtech pinned «Here are some of the tools that we use when we perform Live Recon Recon-ng - https://github.com/lanmaster53/recon-ng httpx - https://github.com/projectdiscovery/httpx isup.sh - https://github.com/gitnepal/isup Arjun - https://github.com/s0md3v/Arjun jSQL…»
Happy Deepawali all of you 🎆🎆🎇🎇🎆🎆🎇
https://www.facebook.com/BhaiKaniyhaManavSevaTrustSirsa/videos/401292448209363/

Bread pakoda meal in bhai kanhaiya ashram

i waste approx 8-9k money every Deepawali in firecrackers but this time i do this thing first time and this is my best Deepawali

Happy Deepawali all of you 🎇🎇🎆🎇🎆


❤️❤️ Enjoy and Share ❤️❤️

Support Us ❤️
Channel : @freelearningtech
Group : @freelearningtech21
Website : https://freelearningtech.in/
Hack Devs X Technical Guys X FreeLearningTechƒ╗
Presenting - Sunday Special Sessionƒ╗

Session Topics :

What is Cryptography
What is Plain text
What is Cipher text
What is Symmetric encryption
What is Asymmetric encryption
What is Public Key
What is private Key ( secret key )
Types of Encryption
Steam Encryption
MD5 encryption (Message-Digest algorithm 5)
SHA Encryption (Secure Hash Algorithm)
SALT Encryption
Crypt Encryption
Play cipher Encryption 5*5 Matrix
DES Encryption (Data Encryption Standard)
RSA Encryption
Manually encryption and decryption
Examples of how to create encryption and decryption manually

Google Meet Link: will be provided in groups.. .

Time an date : 7/November 2021 Sunday - 7:30 PM IST

Speaker : @Wh¡țê_ĐêVī| aka- Nikhil



Group Links :
Hack Devs 1.0 --> https://chat.whatsapp.com/HUjROkewTZUH0exkR3c0Od
Hack Devs 2.0 --> https://chat.whatsapp.com/HKYwHtW1lpoLFVJRYLY70s
Free Learning Tech --> https://t.me/freelearningtech
Technical Guys (Main) --> https://chat.whatsapp.com/BblNjSs2uzs2uPmTLezXyo
Technical Guys (On- topic) --> https://chat.whatsapp.com/BtvJz29bnoCF0Rbq5frUOX
Subdomain Bruteforce

Subdomain Bruteforce is where we find the Subdomain which is kept private, after that we find bugs in it, with the help of Subdomain Bruteforce, sometimes Subdomain is also available to access the admin panel.

Subdomain Bruteforce We use Subdomain Bruteforce when we do not get the correct result from Subdomain Scrapping or if we do not find a bug in the subdomains emitted by Subdomain Scrapping.

You can find subdomains vai shodan also we will told you already -
https://t.me/freelearningtech/396

There are so many tools availabe for subdomain bruteforce like recon-ng tool. This tool is pre installed in Kali linux first you run this tool.

command - recon-ng

Here you can check by writing help, what features do you get here, you get a marketplace here, where you get a lot of modules. you have to install this module to do Subdomain Bruteforce.

Commands
(marketplace)
(marketplace search Brute)
(marketplace install recon/domains-hosts/brute_hosts)
(modules load recon/domains-hosts/brute_hosts)
(options list)
(options set source (your target))
(run)

Commands are typed in brackets but you don't use breakets when you run these commands

The valid subdomain it can show results in green color.

You can also create your own wordlist, we have told you how to create target base password wordlist in this article.

You can also use pre defiend subdomain bruteforce list also.

Tool links

https://github.com/rbsec/dnscan

https://github.com/sharsi1/sublazerwlst

https://github.com/cujanovic/subdomain-bruteforce-list

You can also do subdomain bruteforce via burp suite also we will tell you in next post.

❤️❤️ Enjoy and Share ❤️❤️

Support Us ❤️
Channel : @freelearningtech
Group : @freelearningtech21
Website : https://freelearningtech.in/
Freelearningtech pinned «Subdomain Bruteforce Subdomain Bruteforce is where we find the Subdomain which is kept private, after that we find bugs in it, with the help of Subdomain Bruteforce, sometimes Subdomain is also available to access the admin panel. Subdomain Bruteforce We…»
We'll upload leaked and pirated course. If u want that then take backup as early as possible. Mind it we will delete those after 2 days. So take backup if u need those.

Thank You...
Freelearningtech pinned «We'll upload leaked and pirated course. If u want that then take backup as early as possible. Mind it we will delete those after 2 days. So take backup if u need those. Thank You...»
I am creating a list. So if you people need any course of Udemy, then let me know.
You can send me the course name with the link in my DM :
@cyberalien_bot
Freelearningtech pinned Deleted message
Media is too big
VIEW IN TELEGRAM
Today Cryptography class

❤️❤️ Enjoy and Share ❤️❤️

Support Us ❤️
Channel : @freelearningtech
Group : @freelearningtech21
Website : https://freelearningtech.in/
Here we will tell you almost 25-30 methods of Social media Hacking one by one.

Check Pinned messages regularly if i told all methods in one post then post is too long and no one read this i hope you can understand.

👉👉Phishing attack 👉👉

You must have heard about this attack at some time or another. This is the easiest and most common method used in Social Media HACKING. Because whenever we do research about social media hacking, then this is the first method that comes in front of us.

Most everyone knows the phishing attack because we get to see this attack everywhere, but we want to tell you that the common attack is as dangerous as the phishing attack, because to what level you can do it by taking the phishing attack it depends on you

You must have heard at the time of corona virus that people have been scammed by phishing and email spoofing, now you think yourself that if phishing attack was simple, it would not have been used in such big scams.

We all know that in a phishing attack, an attacker creates a fake page like suppose you have to hack someone's Facebook or Instagram account, in such a way you create a web page that looks like Facebook, after that you convince to login through social engineering.

You have many ways to do this work, like you get many tools, you can do it manually as well as you also get some such websites from where phishing link is generated.

There are so many tools for phishing attacks available on github buts its simple method when you read our all posts about social media hacking then you know how to do phishing in advanced and different methods.

May be some tools are not working properly then you can try another one. There are so many tools but here we mention some tools.

👇👇👇👇👇👇👇👇👇

Link - https://github.com/htr-tech/nexphisher

Link - https://github.com/htr-tech/zphisher

Link - https://github.com/iinc0gnit0/BlackPhish

Link - https://github.com/Optane002/ZPhisher

Link - https://github.com/evildevill/emptyphish

Link - https://github.com/Sitiaro/Phisher-X

Link - https://github.com/tassoneroberto/phishing-websites

Link - https://github.com/itsmehacker/AllPhish

Link - https://github.com/DarkSecDevelopers/HiddenEye-Legacy

Link - https://github.com/An0nUD4Y/blackeye

Link - https://github.com/bhikandeshmukh/Blackeye-v2.0

Link - https://github.com/Riansh1211/blackeye-1

Link - https://github.com/xHak9x/SocialPhish

Link - https://github.com/UndeadSec/SocialFish


❤️❤️ Enjoy and Share ❤️❤️

Support Us ❤️
Channel : @freelearningtech
Group : @freelearningtech21
Website : https://freelearningtech.in/
Freelearningtech pinned «Here we will tell you almost 25-30 methods of Social media Hacking one by one. Check Pinned messages regularly if i told all methods in one post then post is too long and no one read this i hope you can understand. 👉👉Phishing attack 👉👉 You must have heard…»
Forwarded from CYBERMONKEYOFFICIAL
LATEST TECHNOLOGY AND CYBERNEWS

BY
@cybermonkeyofficials

🌐MICROSOFT WILL END ONEDRIVE UPDATES TO WINDOWS 7,8 IN MARCH 2022

🌐GOOGLE TO AUTO ENABLE 2 STEP VERIFICATION FOR MILLIONS OF ACCOUNTS FROM NOV 9
ROBINHOOD SAYS A

🌐HACKER WHO TRIED TO EXTORT THE COMPANY GOT ACCESS TO DATA FOR 7 MILLION CUSTOMERS

🌐CHINA HACKERS SUSPECTED OF TARGETTING 370 US SITES

🌐US CHARGES KASEYA HACKER AND SEIZES $6M FROM REvil RANSOMWARE GANG

🌐US AUTHORITIES ISSUES $10 M BOUNTY IN THE HUNT FOR MAJOR US PIPELINE HACKERS

🌐CRYPTO MARKET HITS $3 TRILLION FOR THE FIRST TIME , BITCOIN NEARS RECORD HIGH

🌐BRIGHTEST EVER X-RAY SHOWS LUNG VESSELS ALTERED BY COVID-19

🌐WHATSAPP WEB ALLOWS SENDING AND RECEIVING MESSAGES WITHOUT CONNECTING A PHONE

🌐US-BASED META COMPANY ACUSES FACEBOOK OF STEALING ITS NAME

🌐HACKER STEALS $55 MN AS A BZX DEVELOPER FALLS FOR PHISHING ATTACK

🌐WHATSAPP'S COMMUNITIES TO LET ADMINS CREATE GROUPS WITHIN GROUPS

🌐AI SYSTEM THAT LETS ROBOTS MANIPULATE 2000 OBJECTS CREATED MIT

🌐TOP CHIPMAKERS SET TO SUBMIT SEMICONDUCTOR DATA TO US GOVT

🌐QUALCOMM ANNOUNCES EVENT FOR PREMIUM ANDROID PROCESSOR DATES EXPECTATION AND MORE

🌐DATA BREACH AT CDSLs KYC ARM EXPOSED 4.38 CR INVESTORS DATA TWICE WITHIN 10 DAYS

🌐CHINA SAYS INDIAN GOVT BACKED GROUP EVIL FLOWER IS ATTACKING IT SHUTS DOWN AIRLINES DATA


DO FOLLOW
@cybermonkeyofficials ON INSTAGRAM TO LEARN MORE

LINK TO OUR NEWS CHANNEL

https://www.instagram.com/p/CUCXe1_FfsD/?utm_medium=copy_link

*TELEGRAM SUPPORT*
https://t.me/cybermonkeyofficials