Freelearningtech pinned «i am sure You have listen about whois but here we will tell you about Reverse Whois. For Reverse WHOIS you can use whoxy website, as we are running the target of google ,there will also be the owner of google, whose name you will get from google, find other…»
Freelearningtech pinned «Here are some of the tools that we use when we perform Live Recon Recon-ng - https://github.com/lanmaster53/recon-ng httpx - https://github.com/projectdiscovery/httpx isup.sh - https://github.com/gitnepal/isup Arjun - https://github.com/s0md3v/Arjun jSQL…»
https://medium.com/techiepedia/my-first-bounty-via-shodan-search-engine-d4d99cb0a9d7
❤️❤️ Enjoy and Share ❤️❤️
Support Us ❤️
Channel : @freelearningtech
Group : @freelearningtech21
Website : https://freelearningtech.in/
❤️❤️ Enjoy and Share ❤️❤️
Support Us ❤️
Channel : @freelearningtech
Group : @freelearningtech21
Website : https://freelearningtech.in/
Medium
My First bounty via shodan search engine.
Struggled with many tools, 20+dupicates and Not Applicable, I have tried many ways but no luck. One day I come to know that shodan will…
https://www.facebook.com/BhaiKaniyhaManavSevaTrustSirsa/videos/401292448209363/
Bread pakoda meal in bhai kanhaiya ashram
i waste approx 8-9k money every Deepawali in firecrackers but this time i do this thing first time and this is my best Deepawali
Happy Deepawali all of you 🎇🎇🎆🎇🎆
❤️❤️ Enjoy and Share ❤️❤️
Support Us ❤️
Channel : @freelearningtech
Group : @freelearningtech21
Website : https://freelearningtech.in/
Bread pakoda meal in bhai kanhaiya ashram
i waste approx 8-9k money every Deepawali in firecrackers but this time i do this thing first time and this is my best Deepawali
Happy Deepawali all of you 🎇🎇🎆🎇🎆
❤️❤️ Enjoy and Share ❤️❤️
Support Us ❤️
Channel : @freelearningtech
Group : @freelearningtech21
Website : https://freelearningtech.in/
Facebook
Log in or sign up to view
See posts, photos and more on Facebook.
Hack Devs X Technical Guys X FreeLearningTechƒ╗
Presenting - Sunday Special Sessionƒ╗
Session Topics :
What is Cryptography
What is Plain text
What is Cipher text
What is Symmetric encryption
What is Asymmetric encryption
What is Public Key
What is private Key ( secret key )
Types of Encryption
Steam Encryption
MD5 encryption (Message-Digest algorithm 5)
SHA Encryption (Secure Hash Algorithm)
SALT Encryption
Crypt Encryption
Play cipher Encryption 5*5 Matrix
DES Encryption (Data Encryption Standard)
RSA Encryption
Manually encryption and decryption
Examples of how to create encryption and decryption manually
Google Meet Link: will be provided in groups.. .
Time an date : 7/November 2021 Sunday - 7:30 PM IST
Speaker : @Wh¡țê_ĐêVī|☠ aka- Nikhil
Group Links :
Hack Devs 1.0 --> https://chat.whatsapp.com/HUjROkewTZUH0exkR3c0Od
Hack Devs 2.0 --> https://chat.whatsapp.com/HKYwHtW1lpoLFVJRYLY70s
Free Learning Tech --> https://t.me/freelearningtech
Technical Guys (Main) --> https://chat.whatsapp.com/BblNjSs2uzs2uPmTLezXyo
Technical Guys (On- topic) --> https://chat.whatsapp.com/BtvJz29bnoCF0Rbq5frUOX
Presenting - Sunday Special Sessionƒ╗
Session Topics :
What is Cryptography
What is Plain text
What is Cipher text
What is Symmetric encryption
What is Asymmetric encryption
What is Public Key
What is private Key ( secret key )
Types of Encryption
Steam Encryption
MD5 encryption (Message-Digest algorithm 5)
SHA Encryption (Secure Hash Algorithm)
SALT Encryption
Crypt Encryption
Play cipher Encryption 5*5 Matrix
DES Encryption (Data Encryption Standard)
RSA Encryption
Manually encryption and decryption
Examples of how to create encryption and decryption manually
Google Meet Link: will be provided in groups.. .
Time an date : 7/November 2021 Sunday - 7:30 PM IST
Speaker : @Wh¡țê_ĐêVī|☠ aka- Nikhil
Group Links :
Hack Devs 1.0 --> https://chat.whatsapp.com/HUjROkewTZUH0exkR3c0Od
Hack Devs 2.0 --> https://chat.whatsapp.com/HKYwHtW1lpoLFVJRYLY70s
Free Learning Tech --> https://t.me/freelearningtech
Technical Guys (Main) --> https://chat.whatsapp.com/BblNjSs2uzs2uPmTLezXyo
Technical Guys (On- topic) --> https://chat.whatsapp.com/BtvJz29bnoCF0Rbq5frUOX
WhatsApp.com
WhatsApp Group Invite
Subdomain Bruteforce
Subdomain Bruteforce is where we find the Subdomain which is kept private, after that we find bugs in it, with the help of Subdomain Bruteforce, sometimes Subdomain is also available to access the admin panel.
Subdomain Bruteforce We use Subdomain Bruteforce when we do not get the correct result from Subdomain Scrapping or if we do not find a bug in the subdomains emitted by Subdomain Scrapping.
You can find subdomains vai shodan also we will told you already -
https://t.me/freelearningtech/396
There are so many tools availabe for subdomain bruteforce like recon-ng tool. This tool is pre installed in Kali linux first you run this tool.
command - recon-ng
Here you can check by writing help, what features do you get here, you get a marketplace here, where you get a lot of modules. you have to install this module to do Subdomain Bruteforce.
Commands
(marketplace)
(marketplace search Brute)
(marketplace install recon/domains-hosts/brute_hosts)
(modules load recon/domains-hosts/brute_hosts)
(options list)
(options set source (your target))
(run)
Commands are typed in brackets but you don't use breakets when you run these commands
The valid subdomain it can show results in green color.
You can also create your own wordlist, we have told you how to create target base password wordlist in this article.
You can also use pre defiend subdomain bruteforce list also.
Tool links
https://github.com/rbsec/dnscan
https://github.com/sharsi1/sublazerwlst
https://github.com/cujanovic/subdomain-bruteforce-list
You can also do subdomain bruteforce via burp suite also we will tell you in next post.
❤️❤️ Enjoy and Share ❤️❤️
Support Us ❤️
Channel : @freelearningtech
Group : @freelearningtech21
Website : https://freelearningtech.in/
Subdomain Bruteforce is where we find the Subdomain which is kept private, after that we find bugs in it, with the help of Subdomain Bruteforce, sometimes Subdomain is also available to access the admin panel.
Subdomain Bruteforce We use Subdomain Bruteforce when we do not get the correct result from Subdomain Scrapping or if we do not find a bug in the subdomains emitted by Subdomain Scrapping.
You can find subdomains vai shodan also we will told you already -
https://t.me/freelearningtech/396
There are so many tools availabe for subdomain bruteforce like recon-ng tool. This tool is pre installed in Kali linux first you run this tool.
command - recon-ng
Here you can check by writing help, what features do you get here, you get a marketplace here, where you get a lot of modules. you have to install this module to do Subdomain Bruteforce.
Commands
(marketplace)
(marketplace search Brute)
(marketplace install recon/domains-hosts/brute_hosts)
(modules load recon/domains-hosts/brute_hosts)
(options list)
(options set source (your target))
(run)
Commands are typed in brackets but you don't use breakets when you run these commands
The valid subdomain it can show results in green color.
You can also create your own wordlist, we have told you how to create target base password wordlist in this article.
You can also use pre defiend subdomain bruteforce list also.
Tool links
https://github.com/rbsec/dnscan
https://github.com/sharsi1/sublazerwlst
https://github.com/cujanovic/subdomain-bruteforce-list
You can also do subdomain bruteforce via burp suite also we will tell you in next post.
❤️❤️ Enjoy and Share ❤️❤️
Support Us ❤️
Channel : @freelearningtech
Group : @freelearningtech21
Website : https://freelearningtech.in/
Telegram
Freelearningtech
i am sure You have listen about whois but here we will tell you about Reverse Whois.
For Reverse WHOIS you can use whoxy website, as we are running the target of google ,there will also be the owner of google, whose name you will get from google, find other…
For Reverse WHOIS you can use whoxy website, as we are running the target of google ,there will also be the owner of google, whose name you will get from google, find other…
Freelearningtech pinned «Subdomain Bruteforce Subdomain Bruteforce is where we find the Subdomain which is kept private, after that we find bugs in it, with the help of Subdomain Bruteforce, sometimes Subdomain is also available to access the admin panel. Subdomain Bruteforce We…»
Here we will tell you some extensions or add ons which is help you in your bug hunting journey.
Chrome extensions - https://resources.infosecinstitute.com/topic/19-extensions-to-turn-google-chrome-into-penetration-testing-tool/
Firefox add ons - https://resources.infosecinstitute.com/topic/use-firefox-browser-as-a-penetration-testing-tool-with-these-add-ons/
❤️❤️ Enjoy and Share ❤️❤️
Support Us ❤️
Channel : @freelearningtech
Group : @freelearningtech21
Website : https://freelearningtech.in/
Chrome extensions - https://resources.infosecinstitute.com/topic/19-extensions-to-turn-google-chrome-into-penetration-testing-tool/
Firefox add ons - https://resources.infosecinstitute.com/topic/use-firefox-browser-as-a-penetration-testing-tool-with-these-add-ons/
❤️❤️ Enjoy and Share ❤️❤️
Support Us ❤️
Channel : @freelearningtech
Group : @freelearningtech21
Website : https://freelearningtech.in/
Infosecinstitute
19 extensions to turn Google Chrome into a Penetration testing tool | Infosec
Google Chrome is the most popular web browser of the world. It's light weight and comes with a clean interface. This is the main reason of its popularity. It
We'll upload leaked and pirated course. If u want that then take backup as early as possible. Mind it we will delete those after 2 days. So take backup if u need those.
Thank You...
Thank You...
Freelearningtech pinned «We'll upload leaked and pirated course. If u want that then take backup as early as possible. Mind it we will delete those after 2 days. So take backup if u need those. Thank You...»
I am creating a list. So if you people need any course of Udemy, then let me know.
You can send me the course name with the link in my DM : @cyberalien_bot
You can send me the course name with the link in my DM : @cyberalien_bot
Media is too big
VIEW IN TELEGRAM
Today Cryptography class
❤️❤️ Enjoy and Share ❤️❤️
Support Us ❤️
Channel : @freelearningtech
Group : @freelearningtech21
Website : https://freelearningtech.in/
❤️❤️ Enjoy and Share ❤️❤️
Support Us ❤️
Channel : @freelearningtech
Group : @freelearningtech21
Website : https://freelearningtech.in/
Here we will tell you almost 25-30 methods of Social media Hacking one by one.
Check Pinned messages regularly if i told all methods in one post then post is too long and no one read this i hope you can understand.
👉👉Phishing attack 👉👉
You must have heard about this attack at some time or another. This is the easiest and most common method used in Social Media HACKING. Because whenever we do research about social media hacking, then this is the first method that comes in front of us.
Most everyone knows the phishing attack because we get to see this attack everywhere, but we want to tell you that the common attack is as dangerous as the phishing attack, because to what level you can do it by taking the phishing attack it depends on you
You must have heard at the time of corona virus that people have been scammed by phishing and email spoofing, now you think yourself that if phishing attack was simple, it would not have been used in such big scams.
We all know that in a phishing attack, an attacker creates a fake page like suppose you have to hack someone's Facebook or Instagram account, in such a way you create a web page that looks like Facebook, after that you convince to login through social engineering.
You have many ways to do this work, like you get many tools, you can do it manually as well as you also get some such websites from where phishing link is generated.
There are so many tools for phishing attacks available on github buts its simple method when you read our all posts about social media hacking then you know how to do phishing in advanced and different methods.
May be some tools are not working properly then you can try another one. There are so many tools but here we mention some tools.
👇👇👇👇👇👇👇👇👇
Link - https://github.com/htr-tech/nexphisher
Link - https://github.com/htr-tech/zphisher
Link - https://github.com/iinc0gnit0/BlackPhish
Link - https://github.com/Optane002/ZPhisher
Link - https://github.com/evildevill/emptyphish
Link - https://github.com/Sitiaro/Phisher-X
Link - https://github.com/tassoneroberto/phishing-websites
Link - https://github.com/itsmehacker/AllPhish
Link - https://github.com/DarkSecDevelopers/HiddenEye-Legacy
Link - https://github.com/An0nUD4Y/blackeye
Link - https://github.com/bhikandeshmukh/Blackeye-v2.0
Link - https://github.com/Riansh1211/blackeye-1
Link - https://github.com/xHak9x/SocialPhish
Link - https://github.com/UndeadSec/SocialFish
❤️❤️ Enjoy and Share ❤️❤️
Support Us ❤️
Channel : @freelearningtech
Group : @freelearningtech21
Website : https://freelearningtech.in/
Check Pinned messages regularly if i told all methods in one post then post is too long and no one read this i hope you can understand.
👉👉Phishing attack 👉👉
You must have heard about this attack at some time or another. This is the easiest and most common method used in Social Media HACKING. Because whenever we do research about social media hacking, then this is the first method that comes in front of us.
Most everyone knows the phishing attack because we get to see this attack everywhere, but we want to tell you that the common attack is as dangerous as the phishing attack, because to what level you can do it by taking the phishing attack it depends on you
You must have heard at the time of corona virus that people have been scammed by phishing and email spoofing, now you think yourself that if phishing attack was simple, it would not have been used in such big scams.
We all know that in a phishing attack, an attacker creates a fake page like suppose you have to hack someone's Facebook or Instagram account, in such a way you create a web page that looks like Facebook, after that you convince to login through social engineering.
You have many ways to do this work, like you get many tools, you can do it manually as well as you also get some such websites from where phishing link is generated.
There are so many tools for phishing attacks available on github buts its simple method when you read our all posts about social media hacking then you know how to do phishing in advanced and different methods.
May be some tools are not working properly then you can try another one. There are so many tools but here we mention some tools.
👇👇👇👇👇👇👇👇👇
Link - https://github.com/htr-tech/nexphisher
Link - https://github.com/htr-tech/zphisher
Link - https://github.com/iinc0gnit0/BlackPhish
Link - https://github.com/Optane002/ZPhisher
Link - https://github.com/evildevill/emptyphish
Link - https://github.com/Sitiaro/Phisher-X
Link - https://github.com/tassoneroberto/phishing-websites
Link - https://github.com/itsmehacker/AllPhish
Link - https://github.com/DarkSecDevelopers/HiddenEye-Legacy
Link - https://github.com/An0nUD4Y/blackeye
Link - https://github.com/bhikandeshmukh/Blackeye-v2.0
Link - https://github.com/Riansh1211/blackeye-1
Link - https://github.com/xHak9x/SocialPhish
Link - https://github.com/UndeadSec/SocialFish
❤️❤️ Enjoy and Share ❤️❤️
Support Us ❤️
Channel : @freelearningtech
Group : @freelearningtech21
Website : https://freelearningtech.in/
GitHub
GitHub - htr-tech/nexphisher: Advanced Phishing tool
Advanced Phishing tool. Contribute to htr-tech/nexphisher development by creating an account on GitHub.
Freelearningtech pinned «Here we will tell you almost 25-30 methods of Social media Hacking one by one. Check Pinned messages regularly if i told all methods in one post then post is too long and no one read this i hope you can understand. 👉👉Phishing attack 👉👉 You must have heard…»
Forwarded from CYBERMONKEYOFFICIAL
LATEST TECHNOLOGY AND CYBERNEWS
BY @cybermonkeyofficials
🌐MICROSOFT WILL END ONEDRIVE UPDATES TO WINDOWS 7,8 IN MARCH 2022
🌐GOOGLE TO AUTO ENABLE 2 STEP VERIFICATION FOR MILLIONS OF ACCOUNTS FROM NOV 9
ROBINHOOD SAYS A
🌐HACKER WHO TRIED TO EXTORT THE COMPANY GOT ACCESS TO DATA FOR 7 MILLION CUSTOMERS
🌐CHINA HACKERS SUSPECTED OF TARGETTING 370 US SITES
🌐US CHARGES KASEYA HACKER AND SEIZES $6M FROM REvil RANSOMWARE GANG
🌐US AUTHORITIES ISSUES $10 M BOUNTY IN THE HUNT FOR MAJOR US PIPELINE HACKERS
🌐CRYPTO MARKET HITS $3 TRILLION FOR THE FIRST TIME , BITCOIN NEARS RECORD HIGH
🌐BRIGHTEST EVER X-RAY SHOWS LUNG VESSELS ALTERED BY COVID-19
🌐WHATSAPP WEB ALLOWS SENDING AND RECEIVING MESSAGES WITHOUT CONNECTING A PHONE
🌐US-BASED META COMPANY ACUSES FACEBOOK OF STEALING ITS NAME
🌐HACKER STEALS $55 MN AS A BZX DEVELOPER FALLS FOR PHISHING ATTACK
🌐WHATSAPP'S COMMUNITIES TO LET ADMINS CREATE GROUPS WITHIN GROUPS
🌐AI SYSTEM THAT LETS ROBOTS MANIPULATE 2000 OBJECTS CREATED MIT
🌐TOP CHIPMAKERS SET TO SUBMIT SEMICONDUCTOR DATA TO US GOVT
🌐QUALCOMM ANNOUNCES EVENT FOR PREMIUM ANDROID PROCESSOR DATES EXPECTATION AND MORE
🌐DATA BREACH AT CDSLs KYC ARM EXPOSED 4.38 CR INVESTORS DATA TWICE WITHIN 10 DAYS
🌐CHINA SAYS INDIAN GOVT BACKED GROUP EVIL FLOWER IS ATTACKING IT SHUTS DOWN AIRLINES DATA
DO FOLLOW @cybermonkeyofficials ON INSTAGRAM TO LEARN MORE
LINK TO OUR NEWS CHANNEL
https://www.instagram.com/p/CUCXe1_FfsD/?utm_medium=copy_link
*TELEGRAM SUPPORT*
https://t.me/cybermonkeyofficials
BY @cybermonkeyofficials
🌐MICROSOFT WILL END ONEDRIVE UPDATES TO WINDOWS 7,8 IN MARCH 2022
🌐GOOGLE TO AUTO ENABLE 2 STEP VERIFICATION FOR MILLIONS OF ACCOUNTS FROM NOV 9
ROBINHOOD SAYS A
🌐HACKER WHO TRIED TO EXTORT THE COMPANY GOT ACCESS TO DATA FOR 7 MILLION CUSTOMERS
🌐CHINA HACKERS SUSPECTED OF TARGETTING 370 US SITES
🌐US CHARGES KASEYA HACKER AND SEIZES $6M FROM REvil RANSOMWARE GANG
🌐US AUTHORITIES ISSUES $10 M BOUNTY IN THE HUNT FOR MAJOR US PIPELINE HACKERS
🌐CRYPTO MARKET HITS $3 TRILLION FOR THE FIRST TIME , BITCOIN NEARS RECORD HIGH
🌐BRIGHTEST EVER X-RAY SHOWS LUNG VESSELS ALTERED BY COVID-19
🌐WHATSAPP WEB ALLOWS SENDING AND RECEIVING MESSAGES WITHOUT CONNECTING A PHONE
🌐US-BASED META COMPANY ACUSES FACEBOOK OF STEALING ITS NAME
🌐HACKER STEALS $55 MN AS A BZX DEVELOPER FALLS FOR PHISHING ATTACK
🌐WHATSAPP'S COMMUNITIES TO LET ADMINS CREATE GROUPS WITHIN GROUPS
🌐AI SYSTEM THAT LETS ROBOTS MANIPULATE 2000 OBJECTS CREATED MIT
🌐TOP CHIPMAKERS SET TO SUBMIT SEMICONDUCTOR DATA TO US GOVT
🌐QUALCOMM ANNOUNCES EVENT FOR PREMIUM ANDROID PROCESSOR DATES EXPECTATION AND MORE
🌐DATA BREACH AT CDSLs KYC ARM EXPOSED 4.38 CR INVESTORS DATA TWICE WITHIN 10 DAYS
🌐CHINA SAYS INDIAN GOVT BACKED GROUP EVIL FLOWER IS ATTACKING IT SHUTS DOWN AIRLINES DATA
DO FOLLOW @cybermonkeyofficials ON INSTAGRAM TO LEARN MORE
LINK TO OUR NEWS CHANNEL
https://www.instagram.com/p/CUCXe1_FfsD/?utm_medium=copy_link
*TELEGRAM SUPPORT*
https://t.me/cybermonkeyofficials