Freelearningtech
727 subscribers
296 photos
45 videos
163 files
1.21K links
Freelearningtech Is A Platform For Cybersecurity (Hacking), Networking, Digital Marketing, IT Courses... And Many More.

https://linktr.ee/freelearningtech

 
Download Telegram
Forwarded from CYBERMONKEYOFFICIAL
LATEST TECHNOLOGY AND CYBERNEWS

BY
@cybermonkeyofficials

๐ŸŒSPACEX LAUNCHES INDIAN-AMERICAN RAJA CHARI-LED CREW3 FOR 6 MONTH MISSION ABOARD ISS

๐ŸŒINSTAGRAM HEAD'S ACCOUNT GOT LOCKED BREIFLY IN SEP AS SCAMMERS REPORTED HIM DEAD

๐ŸŒMUSK'S BROTHER SOLD $109 MN OF TESLA STOCK A DAY BEFORE HIS POLL ON STOCK SALE

๐ŸŒINSTAGRAM TESTING 89 MONTHLY SUBSCRIPTION FOR EXCLUSIVE CONTENT

๐ŸŒELON MUSK SELLS TESLA SHARES WORTH $1.1 BILLION AFTER A TWITTER POLL

๐ŸŒMETA ALLOWED TO PURSUE MALWARE LAWSUIT AGAINST NSO BY US COURT

๐ŸŒGOOGLE LOSE APPEAL AGAINST $2.8 BILLION EU ANTITRUST FINE

๐ŸŒFACEBOOK MESSENGER GETS END TO END ENCRYPTED VOICE AND VIDEO CALLS

๐ŸŒTAIWAN GOVERNMENT FACES 5 MILLION CYBER ATTACKS DAILY OFFICIAL

๐ŸŒFACEBOOK'S WORK APP WORKPLACE TO INTEGRATE WITH MICROSOFT TEAMS

๐ŸŒSHARES OF AIRTEL AFRICA AND MTN NIGERIA HIT ALL TIME HIGHS

๐ŸŒAIRTEL ORACLE ENTER INTO A DATA CENTER CLOUD DEAL IN INDIA

๐ŸŒAPPLE DIRECTED TO USE EXTERNAL PAYMENT OPTIONS ON APP STORE BY DEC9

๐ŸŒCSA LOOKING FOR SINGAPORE CYBERSECURITY FIRM BLACKLISTED BY US FOR TRAFFICKING HACKING TOOLS

๐ŸŒPS5 JAILBREAK MOVES A STEP CLOSER AFTER PLAYSTATION HACKERS REVEAL NEW EXPLOITS



DO FOLLOW @cybermonkeyofficials ON INSTAGRAM TO LEARN MORE

*LINK TO OUR NEWS CHANNEL*
https://www.instagram.com/p/CUCXe1_FfsD/?utm_medium=copy_link

*TELEGRAM SUPPORT*
https://t.me/cybermonkeyofficials
Here we will tell you most used Hardware Hacking Devices. We told you already about Rubber ducky you can read our post.

Post Link - https://t.me/freelearningtech/391

ESP32 CAM

ESP32 CAM is a wifi monitoring Device if Hackers use this ESP32 CAM then they are capable to seen a live footage. Like if you are a Hacker and you want to spy someone then you can do this vai TTL Module and ESP32 CAM.

You can use TTL Module with ESP32 CAM then you can capable to spy someone. Here you can use white Bread board and jumper wires also white bread board is optional but jumper wires is compulsory for connection TTL Module with ESP32 CAM.

ESP32 CAM - BUY NOW

TTL Module - BUY NOW

Jumper wires - BUY NOW

Bread Board - BUY NOW

Aurdino board nano r3 an RFID Sensor

You are listen about RFID Sensor in offices like when employee enter the office they scan their cards. RFID Sensor will help you to decode the RFID tags.

Aurdino board nano r3 - BUY NOW

RFID Sensor - BUY NOW

Raspberry Pi 4

You all are know about Raspberry Pi. This is also called a Pocket Motherboard. Raspberry Pi 4 is very useful device in Cyber Security. If you want to become an Ethical Hacker then you must buy Raspberry Pi 4.

Raspberry Pi 4 - BUY NOW

Raspberry Pi Zero

Node MCU

NODE MCU is used for wifi Hacking. You can do wifi Jamming , Beacon-flood attack and Probe-request attack vai NODE MCU. NODE MCU Use as WIFI DUCK also.

NODE MCU - BUY LINK

I would've loved these products if i had to be you. Go for it if you need it.

โค๏ธโค๏ธ Enjoy and Share โค๏ธโค๏ธ

Support Us โค๏ธ
Channel : @freelearningtech
Group : @freelearningtech21
Website : https://freelearningtech.in/
Freelearningtech pinned ยซHere we will tell you most used Hardware Hacking Devices. We told you already about Rubber ducky you can read our post. Post Link - https://t.me/freelearningtech/391 ESP32 CAM ESP32 CAM is a wifi monitoring Device if Hackers use this ESP32 CAM then theyโ€ฆยป
https://jmrcsnchz.medium.com/how-i-escalated-a-time-based-sql-injection-to-rce-bbf0d68cb398


โค๏ธโค๏ธ Enjoy and Share โค๏ธโค๏ธ

Support Us โค๏ธ
Channel : @freelearningtech
Group : @freelearningtech21
Website : https://freelearningtech.in/
Forwarded from CYBERMONKEYOFFICIAL
LATEST TECHNOLOGY AND CYBERNEWS

BY
@cybermonkeyofficials

๐ŸŒYOUTUBE TO NO LONGER SHOW THE NUMBER OF DISLIKES ON VIDEOS TO PUBLIC

๐ŸŒINSTAGRAM BEGINS TESTING "TAKE A BREAK" FEATURE
WIKI LEAKS FOUNDER

๐ŸŒJULIAN ASSANGE GIVEN PERMISSION TO MARRY PARTENR IN JAIL

๐ŸŒAUCTION FOR 5G SPECTRUM LIKELY IN APRIL-MAY 2022 IT MINISTER VAISHNAW

๐ŸŒAPPLE RELEASES ICLOUD FOR WINDOWS 13

๐ŸŒISRO ENTERS X-BAND TELEMETRY AND COMMAND REGIME WITH NEW 18M ANTENNA

๐ŸŒLEGAL REGIME OF DATA PRIVACY IN CHINA : HURDLE FOR FOREIGN TECH FIRM

๐ŸŒMICROSOFT XBOX APP TO SOON LET YOU INSTALL PC GAMES FREELY

๐ŸŒGMAIL WIDGET ON IOS GETS THE MOST USEFUL UPDATE

๐ŸŒCHINA STILL STEALS COMMERCIAL SECRETS FOR ITS OWN FIRMS PROFIT

๐ŸŒLGBT DATING SITE PERMANENTLY REMOVED FROM INTERNET IN BLACK SHADOW FIGHT

๐ŸŒHACKERS ALLEGEDLY STOLE DATA FROM 7 MILLION ROBINHOOD CUSTOMERS, ACCORDING TO COMPANY


DO FOLLOW @cybermonkeyofficials ON INSTAGRAM TO LEARN MORE

*LINK TO OUR NEWS CHANNEL*
https://www.instagram.com/p/CUCXe1_FfsD/?utm_medium=copy_link

*TELEGRAM SUPPORT*
https://t.me/cybermonkeyofficials
LEGION SMTP CRACK V 6.1.zip
761 KB
๐Ÿ”ฅ ๐—Ÿegion ๐—ฆ๐— ๐—ง๐—ฃ ๐—–๐—ฟ๐—ฎ๐—ฐ๐—ธ๐—ฒ๐—ฟ ๐—ก๐—ฒ๐˜„ ๐—จ๐—ฝ๐—ฑ๐—ฎ๐˜๐—ฒ v6.1 ๐Ÿ”ฅ
๐™‰๐™š๐™ฌ ๐™๐™š๐™–๐™ฉ๐™ช๐™ง๐™š๐™จ ๐˜ผ๐™™๐™™๐™š๐™™^_:

[+] Only Crack AWS and Send To Your email
Feature added
( it Will Crack Only AWS ses and smtps ,aws Rdp Panels , and Auto create aws smtps From aws ses and Valid send to your email )
[+] SendGrid Combo smtps Cracker Added
[+] Office 365 Combo Smtps Cracker added
[+] Filter All Emails Domins added
[+] All CMS filter and auto all CMS bruter added
[+] Send twillio and Nexmo test On Your Number added
[+] Speed Boosted
[+] Fixed SMTP Checker
[+] Fixed phpmyadmin Logins cracker
[+] Fixed and Updated SMTP cracker option 2 and improved its cracking
[+] Fixed Shells uploader
[+] Fixed Mass IP range and Scan
[+] Improved auto Send test email
[+] Private Cpanel Cracker
[+] WordPress Shell Uploader
[+]Many tools Added

Share And Support โ˜„
Here we will tell you How Hackers hack Social Media accounts using Batch Script. Batch Script is a programming language you already Know. Batch Scripts are stored in simple text files containing lines with commands that get executed in sequence, one after the other.

I know that it is not a proper method of social media hacking but you know about this because some time its useful for you. We will explain you with an example like you are a hacker and you have these files and you put that files your victim PC and when your victim see that files then it is possibility your victim use that file for login our social media accounts.

We will share here two files as a example for social media hacking. First we will clear one thing if you use these files for social media hacking then you have to physical access of your victim device. We will share files for Facebook Hacking but if you want then you can make files like that for other social media platforms.

Like you make a batch script and file name is like this (facebook chat without internet) or (use facebook with cool features) etc. when the normal user run that file the CMD is open front of him and when they login his/her account you got a victims username or password. First you try your own PC how it works and how that files create another files for saving user credentials.

If you know about batch script then you got a user credentials vai email also and then you don't need to access physical access again and again. In other words we will tell you once you put that files on your victim device then you get a user credentials remotely.

Article Link - https://freelearningtech.in/how-to-hack-facebook-using-batch-file/

Download Link


โค๏ธโค๏ธ Enjoy and Share โค๏ธโค๏ธ

Support Us โค๏ธ
Channel : @freelearningtech
Group : @freelearningtech21
Website : https://freelearningtech.in/
๐Ÿ‘1
Freelearningtech pinned ยซHere we will tell you How Hackers hack Social Media accounts using Batch Script. Batch Script is a programming language you already Know. Batch Scripts are stored in simple text files containing lines with commands that get executed in sequence, one afterโ€ฆยป
Forwarded from CYBERMONKEYOFFICIAL
LATEST TECHNOLOGY AND CYBERNEWS

BY
@cybermonkeyofficials

๐ŸŒSTARLINK'S NEW ROUTER HAS ORBITAL MAP PATTER FROM EARTH TO MARS REVEALS ELON MUSK

๐ŸŒUSER MODIFIED IPHONE X WITH USB-C PORT SELLS FOR $86,001 ON EBAY

๐ŸŒTWITTER TO NO LONGER CROP WITH IMAGE PREVIEWS ON WEB

๐ŸŒHUAWEI ELECTRIC SCOOTER WITH HARMONYOS SUPPORT LAUNCHED

๐ŸŒAIRTLE BEGINS 5G TRIALS IN BENGALURU IN 3500 MHz BAND SPECTRUM

๐ŸŒPERSONAL DATA PROTECTION BILL MAY BE TABLED IN PARLIAMENT IN 1st WEEK OF WINTER SESSION

๐ŸŒNEW UPDATE WILL LET YOU HIDE YOUR WHATSAPP 'LAST SEEN' FROM SELECTED CONTACTS

๐ŸŒUS GOVERNMENT SEIZES $6.1 MILLION FROM RANSOMWARE HACKERS

๐ŸŒPALO ALTO NETWORKS PATCHES ZERO DAY BUG IN ITS GLOBAL PROTECT PORTAL VPN

๐ŸŒAPPLE LATEST BETA FIXES MACRO MODE CONFUSION FOR IPHONE 13 PRO

๐ŸŒINSTAGRAM REELS NOW HAVE TEXT TO SPEECH AND VOICE EFFECTS JUST LIKE TIK TOK



DO FOLLOW @cybermonkeyofficials ON INSTAGRAM TO LEARN MORE

*LINK TO OUR NEWS CHANNEL*
https://www.instagram.com/p/CUCXe1_FfsD/?utm_medium=copy_link

*TELEGRAM SUPPORT*
https://t.me/cybermonkeyofficials
Forwarded from Network Slutter โ„ข ๐Ÿฅท
Please open Telegram to view this post
VIEW IN TELEGRAM
Forwarded from CYBERMONKEYOFFICIAL
LATEST TECHNOLOGY AND CYBERNEWS

BY
@cybermonkeyofficials

๐ŸŒMAHARASHTRA GOVT SIGNS MoU AT COP26 TO BOOST ADOPTION OF EVs

๐ŸŒAMAZON's PRIME AIR DRONE UNIT DISBANDS FRENCH R&D TEAM

๐ŸŒNAL's DRONE DELIVERS COVID-19 VACCINES TO A REMOTE K'TAKA VILLAGE

๐ŸŒSPACEX LAUNCHES 53 STARLINK INTERNET SATELLITES TO ORBIT

๐ŸŒFAKE HACKING WARNINGS SENT FROM SECURE FBI SERVER

๐ŸŒKRAFTON PERMANENTLY BANS 2.5 MILLION BGMI ACCOUNTS FOR ILLEGAL PROGRAMS

๐ŸŒAPPLE TO PAY $1286 EACH TO OVER 14,000 WORKERS FORCED TO UNDERGO SECURITY CHECKS

๐ŸŒIIT DELHI ALUMNUS $ TECH ENTERPRENEUR ANANT YARDI GIFTS 75 CRORE TO THE COLLEGE

๐ŸŒTELENOR AND GOOGLE CLOUD PARTNER UP TO DIGITALISE TELECOM OPERATIONS

๐ŸŒEXPERTS CALL FOR 'GENEVA CONVENTION' FOR CYBERSECURITY AT ABU DHABI STRATEGIC DEBATE

๐ŸŒIBM SAYS QUANTUM CHIP COULD BEAT STANDARD CHIPS IN TWO YEARS

๐ŸŒGUJRAT:HUGE SIM CARD RACKET BUSTED IN SABARKANTH

๐ŸŒ3195 GRAM PANCHAYATS TO BE PROVIDED WITH INTERNET CONNECTIVITY IN J&K

๐ŸŒHACKING GANG AT HEART OF KARNATKA BITCOIN SCANDAL TRIED TO STEAL RS 46 CRORA FROM STATE E-GOVERNANCE UNIT

๐ŸŒ5.9M CUSTOMERS OF REDDOORZ HOTEL BOOKING SITE LEAKED IN SPORE'S LARGEST DATA BREACH


DO FOLLOW @cybermonkeyofficials ON INSTAGRAM TO LEARN MORE

LINK TO OUR NEWS CHANNEL
https://www.instagram.com/p/CUCXe1_FfsD/?utm_medium=copy_link

TELEGRAM SUPPORT
https://t.me/cybermonkeyofficials
Cyber Crime Tools

There are many types of Digital forensic tools

Kali Linux:

Kali Linux is an open-source software that is maintained and funded by Offensive Security. It is a specially designed program for digital forensics and penetration testing.

Ophcrack:

This tool is mainly used for cracking the hashes, which are generated by the same files of windows. It offers a secure GUI system and allows you to runs on multiple platforms.

EnCase:

This software allows an investigator to image and examine data from hard disks and removable disks.

SafeBack:

SafeBack is mainly using for imaging the hard disks of Intel-based computer systems and restoring these images to some other hard disks.

Data dumper:

This is a command-line computer forensic tool. It is freely available for the UNIX Operating system, which can make exact copies of disks suitable for digital forensic analysis.

Md5sum:

A tool to check helps you to check data is copied to another storage successfully or not.
Forwarded from CYBERMONKEYOFFICIAL
LATEST TECHNOLOGY AND CYBERNEWS

BY
@cybermonkeyofficials

๐ŸŒFIRE BREAKS OUT SAMSUNG SERVICE CENTRE IN MUMBAI , 8 FIRES ENGINES TO SPOT

๐ŸŒCENTRE'S PANEL AGREES THAT CRYPTO CAN'T BE STOPPED BUT MUST BE REGULATED

๐ŸŒGOOGLE PLAY STORE REMOVES AT LEAST 7 ANDROID APPS WITH JOKER MALWARE

๐ŸŒAPPLE PATENT FILING REVEALS GLASSES TO PREVENT OTHERS FROM PEEPING INTO IPHONE
POLICE TO QUESTION

๐ŸŒAMAZON INDIA OFFICIALS OVER ALLEGED WEED SMUGGLING

๐ŸŒINDIA SHOULD LET FOREIGN FIRMS SET UP HYPERLOOP DEMO : NITI AAYOG MEMBER

๐ŸŒGOVT MAY INTRODUCE BILL ON CRYPTOS IN PARLIAMENT THIS YEAR

๐ŸŒAMAZON LAUNCHES PRIME VIDEO APP FOR MAC

๐ŸŒRAJASTHAN: BALOTRA POLICE ARRESTS FOUR FOR HACKIGN ATMs ACROSS THE COUNTRY

๐ŸŒIRANIAN HACKING GROUP TARGETS TELECOMS , ISPs, FOREIGN MINISTRIES IN NIGERIA OTHERS

๐ŸŒ4 OUT OF 5 INDIAN ONLINE GAMERS LOSING RS 7,894 ON AVERAGE TO HACKERS WHILE PLAYING

DO FOLLOW
@cybermonkeyofficials ON INSTAGRAM TO LEARN MORE

LINK TO OUR NEWS CHANNEL
https://www.instagram.com/p/CUCXe1_FfsD/?utm_medium=copy_link

TELEGRAM SUPPORT
https://t.me/cybermonkeyofficials
Forwarded from CYBERMONKEY BACKUP
@cybermonkeyofficials CyberLaws in India and IT act (1).pdf
14.9 KB
INFORMATION TECHNOLOGY- CYBER LAWS IN INDIA AND
IT ACT

Credits -
@cybermonkeyofficials

{Section 52 of the Copyright Act, 1957 stipulates permissible uses of the Copyright without specific authorization from the author. Therefore, the said Section allows legitimate use of the copyrighted work for educational, scientific and cultural advancement of the society}

โœ๏ธ Objectives of Cyber Laws in India
โœ๏ธ Introduction
โœ๏ธCrime
โœ๏ธCyber Crime
โœ๏ธThe Genesis of IT Legislation in India
โœ๏ธ Objectives Of IT Legislation in India
โœ๏ธ Amendment Act 2008
โœ๏ธHow the Act is structured
โœ๏ธ Applicability
โœ๏ธ Definitions
โœ๏ธ Digital Signature
โœ๏ธ E-governance

๐Ÿ‘‰ Previous Notes are Uploaded in Backup Channel

https://t.me/backupcybermonkeyofficials

INSTAGRAM SUPPORT
https://www.instagram.com/p/CQvl6PPDPQy/?utm_medium=share_sheet

TELEGRAM SUPPORT
https://t.me/cybermonkeyofficials