Forwarded from Network Slutter ™ 🥷
Please open Telegram to view this post
VIEW IN TELEGRAM
Forwarded from Course Dump ! (Rœt)
Please open Telegram to view this post
VIEW IN TELEGRAM
Forwarded from CYBERMONKEYOFFICIAL
LATEST TECHNOLOGY AND CYBERNEWS
BY @cybermonkeyofficials
🌐UK ENGINEER IN HIS 40s 'WORLDS FIRST' PERSON TO RECEIVE FULLY 3D PRINTED EYE
🌐INDIA GOVT ASKS MUSK'S STARLINK TO STOP TAKING BOOKINGS SAYS ITS NOT A LICENSEE
🌐TATA IN TALKS TO SET UP $300 MN SEMICONDUCTOR PLANT IN INDIA
🌐EU INTERNET REGULATION TO PUSH FACEBOOK TO SANITISE METAVERSE PLATFORMS
🌐WHATSAPP WINS APPROVAL TO DOUBLE PAYMENT OFFERING TO 40 MLN USERS IN INDIA
🌐ISRAEL SLASHES LIST OF COUNTRIES THAT CAN BUY CYBER TECH
🌐TWITTER INVESTIGATING BUG THAT UNEXPECTEDLY LOGS OUT IPHONE USERS
🌐CRUCIAL TO DEFINE NORMS OF INTERNET GOVERNANCE , SAYS IT MINIsTER ASWINI VAISHNAW
🌐AIRTEL CONDUCTS FIRST 5G TRIAL ON 700 MHZ BAND IN SA MODE WiTH NOKIA
🌐INDIAN FANTASY GAMING GROUP DREAM SPORTS RAISES $840 MILLION
🌐JAMMU TO GET FREE WIFI SERVICE AT 20 MORE LOCATION UNDER SMART CITY MISSION
🌐CRYPTO HACKERS USING BABADEDA CRYPTER TO MAKE THEIR MALWARE UNDETECTABLE
🌐UK IS PLANNING TO PROTECT ITS CITIZENS FROM PASSWORD HACKERS:PASSES A CYBER LAW TO BAN UNIVERSAL DEFAULT PASSWORDS
🌐NATIONAL COMPUTER SECURITY DAY-CYBER SECURITY AWARENESS RALLY AT SALTLAKE ON 30 NOVEMBER 2021
🌐CENTCEX TO LAUNCH NO KYC CRYPTO EXCHANGE WHICH IS SAFER THAN KUCOIN BY COINQUORA
🌐PUBG:NEW STATE BUG ALLOWED IN GAME ITEMS TO BE MISTAKENLY CLAIMED , AFFECTED ACCOUNTS BLOCKED
DO FOLLOW @cybermonkeyofficials ON INSTAGRAM TO LEARN MORE
LINK TO OUR NEWS CHANNEL
https://www.instagram.com/p/CUCXe1_FfsD/?utm_medium=copy_link
TELEGRAM SUPPORT
https://t.me/cybermonkeyofficials
BY @cybermonkeyofficials
🌐UK ENGINEER IN HIS 40s 'WORLDS FIRST' PERSON TO RECEIVE FULLY 3D PRINTED EYE
🌐INDIA GOVT ASKS MUSK'S STARLINK TO STOP TAKING BOOKINGS SAYS ITS NOT A LICENSEE
🌐TATA IN TALKS TO SET UP $300 MN SEMICONDUCTOR PLANT IN INDIA
🌐EU INTERNET REGULATION TO PUSH FACEBOOK TO SANITISE METAVERSE PLATFORMS
🌐WHATSAPP WINS APPROVAL TO DOUBLE PAYMENT OFFERING TO 40 MLN USERS IN INDIA
🌐ISRAEL SLASHES LIST OF COUNTRIES THAT CAN BUY CYBER TECH
🌐TWITTER INVESTIGATING BUG THAT UNEXPECTEDLY LOGS OUT IPHONE USERS
🌐CRUCIAL TO DEFINE NORMS OF INTERNET GOVERNANCE , SAYS IT MINIsTER ASWINI VAISHNAW
🌐AIRTEL CONDUCTS FIRST 5G TRIAL ON 700 MHZ BAND IN SA MODE WiTH NOKIA
🌐INDIAN FANTASY GAMING GROUP DREAM SPORTS RAISES $840 MILLION
🌐JAMMU TO GET FREE WIFI SERVICE AT 20 MORE LOCATION UNDER SMART CITY MISSION
🌐CRYPTO HACKERS USING BABADEDA CRYPTER TO MAKE THEIR MALWARE UNDETECTABLE
🌐UK IS PLANNING TO PROTECT ITS CITIZENS FROM PASSWORD HACKERS:PASSES A CYBER LAW TO BAN UNIVERSAL DEFAULT PASSWORDS
🌐NATIONAL COMPUTER SECURITY DAY-CYBER SECURITY AWARENESS RALLY AT SALTLAKE ON 30 NOVEMBER 2021
🌐CENTCEX TO LAUNCH NO KYC CRYPTO EXCHANGE WHICH IS SAFER THAN KUCOIN BY COINQUORA
🌐PUBG:NEW STATE BUG ALLOWED IN GAME ITEMS TO BE MISTAKENLY CLAIMED , AFFECTED ACCOUNTS BLOCKED
DO FOLLOW @cybermonkeyofficials ON INSTAGRAM TO LEARN MORE
LINK TO OUR NEWS CHANNEL
https://www.instagram.com/p/CUCXe1_FfsD/?utm_medium=copy_link
TELEGRAM SUPPORT
https://t.me/cybermonkeyofficials
Forwarded from Network Slutter ™ 🥷
Please open Telegram to view this post
VIEW IN TELEGRAM
Forwarded from CYBERMONKEYOFFICIAL
BASIC TECHNICAL DIFFERENCES
BY @cybermonkeyofficials
⭕ Difference Between 32-Bit and 64-Bit Operating System
🖇️ Link
https://www.instagram.com/p/CLeiWA1AeKX/?utm_medium=copy_link
⭕ Difference Between Proxy and VPN
🖇️ Link
https://www.instagram.com/p/CLHKaTVghUh/?utm_medium=copy_link
⭕ Difference Between HDD and SSD
🖇️ LINK
https://www.instagram.com/p/CLwnRoXggSv/?utm_medium=copy_link
⭕ DIFFERENCE BETWEEN LINUX AND WINDOWS
🖇️ LINK
https://www.instagram.com/p/CMATSaTgeRh/?utm_medium=copy_link
⭕ DIFFERENCE BETWEEN PHISHING AND VISHING
🖇️ LINK
https://www.instagram.com/p/CMXAZY1A0--/?utm_medium=copy_link
⭕ DIFFERENCE BETWEEN REGULAR HOSTING AND BULLETPROOF HOSTING
🖇️ LINK
https://www.instagram.com/p/CMhX_a0jjUW/?utm_medium=copy_link
⭕ *lDIFFERENCE BETWEEN LINUX AND UNIX
🖇️ LINK
https://www.instagram.com/p/CMzdPXRDn1k/?utm_medium=copy_link
⭕ DIFFERENCE BETWEEN PRIVATE IP AND PUBLIC IP
🖇️ LINK
https://www.instagram.com/p/CNKidocAzvr/?utm_medium=copy_link
⭕ DIFFERENCE BETWEEN MALWARE AND RANSOMWARE
🖇️ LINK
https://www.instagram.com/p/CNc3ARFA5Di/?utm_medium=copy_link
⭕ DIFFERENCE BETWEEN MODEM AND ROUTER
🖇️ LINK
https://www.instagram.com/p/CNnK9KUgAbj/?utm_medium=copy_link
⭕ DIFFERENCE BETWEEN HTTP AND HTTPS
🖇️ LINK
https://www.instagram.com/p/CNxMIOOgAIu/?utm_medium=copy_link
⭕ DIFFERENCE BETWEEN CODING AND PROGRAMMING
🖇️ LINK
https://www.instagram.com/p/CN5BtBeAOwN/?utm_medium=copy_link
⭕ DIFFERENCE BETWEEN COOKIES AND SESSIONS
🖇️ LINK
https://www.instagram.com/p/CODH6g6APia/?utm_medium=copy_link
⭕ DIFFERENCE BETWEEN KALILINUX AND PARROT OS
🖇️ LINK
https://www.instagram.com/p/CPXk2gjjaPa/?utm_medium=copy_link
⭕ DIFFERENCE BETWEEN TCP/IP AND OSI MODEL
🖇️ LINK
https://www.instagram.com/p/CP0Vp5oAUPk/?utm_medium=copy_link
⭕ DIFFERENCE BETWEEN ARCH LINUX AND KALILINUX
🖇️ LINK
https://www.instagram.com/p/CQX65UDDDGG/?utm_medium=copy_link
⭕ DIFFERENCE BETWEEN DATA PRIVACY AND DATA SECURITY
🖇️ LINK
https://www.instagram.com/p/CQxuTPHj6Bn/?utm_medium=copy_link
⭕ DIFFERENCE BETWEEN DOS AND DDOS ATTACKS
🖇️ LINK
https://www.instagram.com/p/CQ8u3Wfjc82/?utm_medium=copy_link
⭕ DIFFERENCE BETWEEN UBUNTU AND PARROT OS
🖇️ LINK
https://www.instagram.com/p/CREXHYMD-x_/?utm_medium=copy_link
⭕ DIFFERENCE BETWEEN SCRIPTING AND PROGRAMMING
🖇️ LINK
https://www.instagram.com/p/CRQkhpujmA_/?utm_medium=copy_link
TELEGRAM
https://t.me/cybermonkeyofficials
FOR MORE
https://www.cybermonkeyofficial.in
BY @cybermonkeyofficials
⭕ Difference Between 32-Bit and 64-Bit Operating System
🖇️ Link
https://www.instagram.com/p/CLeiWA1AeKX/?utm_medium=copy_link
⭕ Difference Between Proxy and VPN
🖇️ Link
https://www.instagram.com/p/CLHKaTVghUh/?utm_medium=copy_link
⭕ Difference Between HDD and SSD
🖇️ LINK
https://www.instagram.com/p/CLwnRoXggSv/?utm_medium=copy_link
⭕ DIFFERENCE BETWEEN LINUX AND WINDOWS
🖇️ LINK
https://www.instagram.com/p/CMATSaTgeRh/?utm_medium=copy_link
⭕ DIFFERENCE BETWEEN PHISHING AND VISHING
🖇️ LINK
https://www.instagram.com/p/CMXAZY1A0--/?utm_medium=copy_link
⭕ DIFFERENCE BETWEEN REGULAR HOSTING AND BULLETPROOF HOSTING
🖇️ LINK
https://www.instagram.com/p/CMhX_a0jjUW/?utm_medium=copy_link
⭕ *lDIFFERENCE BETWEEN LINUX AND UNIX
🖇️ LINK
https://www.instagram.com/p/CMzdPXRDn1k/?utm_medium=copy_link
⭕ DIFFERENCE BETWEEN PRIVATE IP AND PUBLIC IP
🖇️ LINK
https://www.instagram.com/p/CNKidocAzvr/?utm_medium=copy_link
⭕ DIFFERENCE BETWEEN MALWARE AND RANSOMWARE
🖇️ LINK
https://www.instagram.com/p/CNc3ARFA5Di/?utm_medium=copy_link
⭕ DIFFERENCE BETWEEN MODEM AND ROUTER
🖇️ LINK
https://www.instagram.com/p/CNnK9KUgAbj/?utm_medium=copy_link
⭕ DIFFERENCE BETWEEN HTTP AND HTTPS
🖇️ LINK
https://www.instagram.com/p/CNxMIOOgAIu/?utm_medium=copy_link
⭕ DIFFERENCE BETWEEN CODING AND PROGRAMMING
🖇️ LINK
https://www.instagram.com/p/CN5BtBeAOwN/?utm_medium=copy_link
⭕ DIFFERENCE BETWEEN COOKIES AND SESSIONS
🖇️ LINK
https://www.instagram.com/p/CODH6g6APia/?utm_medium=copy_link
⭕ DIFFERENCE BETWEEN KALILINUX AND PARROT OS
🖇️ LINK
https://www.instagram.com/p/CPXk2gjjaPa/?utm_medium=copy_link
⭕ DIFFERENCE BETWEEN TCP/IP AND OSI MODEL
🖇️ LINK
https://www.instagram.com/p/CP0Vp5oAUPk/?utm_medium=copy_link
⭕ DIFFERENCE BETWEEN ARCH LINUX AND KALILINUX
🖇️ LINK
https://www.instagram.com/p/CQX65UDDDGG/?utm_medium=copy_link
⭕ DIFFERENCE BETWEEN DATA PRIVACY AND DATA SECURITY
🖇️ LINK
https://www.instagram.com/p/CQxuTPHj6Bn/?utm_medium=copy_link
⭕ DIFFERENCE BETWEEN DOS AND DDOS ATTACKS
🖇️ LINK
https://www.instagram.com/p/CQ8u3Wfjc82/?utm_medium=copy_link
⭕ DIFFERENCE BETWEEN UBUNTU AND PARROT OS
🖇️ LINK
https://www.instagram.com/p/CREXHYMD-x_/?utm_medium=copy_link
⭕ DIFFERENCE BETWEEN SCRIPTING AND PROGRAMMING
🖇️ LINK
https://www.instagram.com/p/CRQkhpujmA_/?utm_medium=copy_link
TELEGRAM
https://t.me/cybermonkeyofficials
FOR MORE
https://www.cybermonkeyofficial.in
Forwarded from Network Slutter ™ 🥷
Please open Telegram to view this post
VIEW IN TELEGRAM
Forwarded from Network Slutter ™ 🥷
Please open Telegram to view this post
VIEW IN TELEGRAM
Forwarded from Network Slutter ™ 🥷
Please open Telegram to view this post
VIEW IN TELEGRAM
Forwarded from CYBERMONKEYOFFICIAL
LATEST TECHNOLOGY AND CYBERNEWS
BY @cybermonkeyofficials
🌐CHINESE COULD HACK DATA FOR FUTURE QUANTUM DECRYPTION,REPORT WARNS
🌐APPLE SAYS IT WILL NOTIFY USERS WHOSE IPHONES WERE HACKED BY SPYWARE
🌐PANASONIC CONFIRMS DATA BREACH AFTER HACKERS ACCESS INTERNAL NETWORK
🌐AUSTRALIAN LAW ENABLES STATE-AUTHORISED HACKING AND SURVEILLANCE
🌐MICROSOFT WINDOWS 10 AND 11 USERS WARNED TO URGENTLY UPDATE SOFTWARE NOW AS HACKERS EXPLOIT NEW MALWARE
🌐MUSK'S STARLINK STOPS PRE-BOOKING IN INDIA
🌐VULNERABILITY REPORTED ON CDSL VENTURES WEBSITE RESOLVED NOW :MOS FINANCE
🌐RUSSIA FINES GOOGLE 3 MILLION ROUBLES FOR NOT DELETING BANNED CONTENT
🌐RELIANCE JIO PREPARING JIO TV AND A JIO TABLET FOR THE INDIAN MARKET TO BE RELEASED IN 2022
🌐RUSSIA SAYS TWITTER MOBILE SLOWDOWN TO REMAIN UNTIL ALL BANNED CONTENT IS REMOVED
🌐JACK DORSEY STEPS DOWN AS TWITTER CEO, PARAG AGARWAL TO REPLACE HIM
🌐META'S ACQUISITION OF GIPHY SET TO BE BLOCKED BY UK REGULATOR
DO FOLLOW @cybermonkeyofficials ON INSTAGRAM TO LEARN MORE
LINK TO OUR NEWS CHANNEL
https://www.instagram.com/p/CW770lVl1Xg/?utm_medium=copy_link
TELEGRAM SUPPORT
https://t.me/cybermonkeyofficials
BY @cybermonkeyofficials
🌐CHINESE COULD HACK DATA FOR FUTURE QUANTUM DECRYPTION,REPORT WARNS
🌐APPLE SAYS IT WILL NOTIFY USERS WHOSE IPHONES WERE HACKED BY SPYWARE
🌐PANASONIC CONFIRMS DATA BREACH AFTER HACKERS ACCESS INTERNAL NETWORK
🌐AUSTRALIAN LAW ENABLES STATE-AUTHORISED HACKING AND SURVEILLANCE
🌐MICROSOFT WINDOWS 10 AND 11 USERS WARNED TO URGENTLY UPDATE SOFTWARE NOW AS HACKERS EXPLOIT NEW MALWARE
🌐MUSK'S STARLINK STOPS PRE-BOOKING IN INDIA
🌐VULNERABILITY REPORTED ON CDSL VENTURES WEBSITE RESOLVED NOW :MOS FINANCE
🌐RUSSIA FINES GOOGLE 3 MILLION ROUBLES FOR NOT DELETING BANNED CONTENT
🌐RELIANCE JIO PREPARING JIO TV AND A JIO TABLET FOR THE INDIAN MARKET TO BE RELEASED IN 2022
🌐RUSSIA SAYS TWITTER MOBILE SLOWDOWN TO REMAIN UNTIL ALL BANNED CONTENT IS REMOVED
🌐JACK DORSEY STEPS DOWN AS TWITTER CEO, PARAG AGARWAL TO REPLACE HIM
🌐META'S ACQUISITION OF GIPHY SET TO BE BLOCKED BY UK REGULATOR
DO FOLLOW @cybermonkeyofficials ON INSTAGRAM TO LEARN MORE
LINK TO OUR NEWS CHANNEL
https://www.instagram.com/p/CW770lVl1Xg/?utm_medium=copy_link
TELEGRAM SUPPORT
https://t.me/cybermonkeyofficials
Forwarded from CYBERMONKEY BACKUP
@cybermonkeyofficials Cybe Crime Laws in India 3 (1).pdf
41.4 KB
CYBER CRIME LAWS IN INDIA
Credits - @cybermonkeyofficials
{Section 52 of the Copyright Act, 1957 stipulates permissible uses of the Copyright without specific authorization from the author. Therefore, the said Section allows legitimate use of the copyrighted work for educational, scientific and cultural advancement of the society}
✍Observations on ITA AND ITAA
✍AWARENESS
✍JURISDICTION
✍EVIDENCES
✍NON COVERAGE OF COMPUTER CRIMES
✍ PREVENTION OF MONEY LAUNDERING
✍E-RECORDS MAINTENANCE POLICY FOR BANKS
✍LEGISLATION IN OTHER NATIONS
✍CONCLUSION
Previous Notes are Uploaded in -
https://t.me/backupcybermonkeyofficials
INSTAGRAM SUPPORT
https://www.instagram.com/p/CQvl6PPDPQy/?utm_medium=share_sheet
TELEGRAM SUPPORT
https://t.me/cybermonkeyofficials
Credits - @cybermonkeyofficials
{Section 52 of the Copyright Act, 1957 stipulates permissible uses of the Copyright without specific authorization from the author. Therefore, the said Section allows legitimate use of the copyrighted work for educational, scientific and cultural advancement of the society}
✍Observations on ITA AND ITAA
✍AWARENESS
✍JURISDICTION
✍EVIDENCES
✍NON COVERAGE OF COMPUTER CRIMES
✍ PREVENTION OF MONEY LAUNDERING
✍E-RECORDS MAINTENANCE POLICY FOR BANKS
✍LEGISLATION IN OTHER NATIONS
✍CONCLUSION
Previous Notes are Uploaded in -
https://t.me/backupcybermonkeyofficials
INSTAGRAM SUPPORT
https://www.instagram.com/p/CQvl6PPDPQy/?utm_medium=share_sheet
TELEGRAM SUPPORT
https://t.me/cybermonkeyofficials
https://drive.google.com/drive/u/0/folders/12Mvq6kE2HJDwN2CZhEGWizyWt87YunkU
❤️❤️ Enjoy and Share ❤️❤️
Support Us ❤️
Channel : @freelearningtech
Group : @freelearningtech21
Website : https://freelearningtech.in/
❤️❤️ Enjoy and Share ❤️❤️
Support Us ❤️
Channel : @freelearningtech
Group : @freelearningtech21
Website : https://freelearningtech.in/
Forwarded from CYBERMONKEYOFFICIAL
LATEST TECHNOLOGY AND CYBERNEWS
BY @cybermonkeyofficials
🌐AIRTEL HOLD'S INDIA'S FIRST 5G TRIAL IN 700 MHZ BAND WITH NOKIA
🌐VIRTUAL LAND SELLS FOR 32 CRORE IN MOST EXPENSIVE 'METAVERSA' PROPERTY SALE
🌐CHINA PLANS TO BAN LOOPHOLE USED BY TECH FIRMS FOR FOREIGN IPOs
🌐OVER 9000 COMPLAINTS OF CYBERFRAUDS RECEIVED ON NATIONAL CONSUMER HELPLINE IN FY21
🌐QUALCOMM, GOOGLE CLOUD COLLABORATE TO CREATE NEXT GEN MOBILE AI
🌐DNA TEST FIRM : 2.1 MILLION AFFECTED BY LEGACY DATABASE HACKDNA TEST FIRM : 2.1 MILLION AFFECTED BY LEGACY DATABASE HACK
🌐MICROSOFT EXCHANGE SERVERS HACKED TO DEPLOY BLACKBYTE RANSOMWARE
🌐THOUSANDS OF HACKED CANADIAN CREDIT CARDS FOR SALE ON DARK WEBTHOUSANDS OF HACKED CANADIAN CREDIT CARDS FOR SALE ON DARK WEB
🌐SAUDI ARABIA SHOWCASES ITS TECH AMBITIONS AS @HACK NAMED 'LARGEST CYBERSECURITY EVENT OF 2021'
🌐DEFI HACK:$31 MILLION STOLEN FROM MonoX PLATFORM ON POLYGON AND ETHEREUM
🌐NEW CYBER CRIME POLICE STATIONS TO START FUNCTIONING IN EACH POLICE DISTRICT IN DELHI FROM 30 NOV 2021
DO FOLLOW @cybermonkeyofficials ON INSTAGRAM TO LEARN MORE
LINK TO OUR NEWS CHANNEL
https://www.instagram.com/p/CW-larLFFsc/?utm_medium=copy_link
TELEGRAM SUPPORT
https://t.me/cybermonkeyofficials
BY @cybermonkeyofficials
🌐AIRTEL HOLD'S INDIA'S FIRST 5G TRIAL IN 700 MHZ BAND WITH NOKIA
🌐VIRTUAL LAND SELLS FOR 32 CRORE IN MOST EXPENSIVE 'METAVERSA' PROPERTY SALE
🌐CHINA PLANS TO BAN LOOPHOLE USED BY TECH FIRMS FOR FOREIGN IPOs
🌐OVER 9000 COMPLAINTS OF CYBERFRAUDS RECEIVED ON NATIONAL CONSUMER HELPLINE IN FY21
🌐QUALCOMM, GOOGLE CLOUD COLLABORATE TO CREATE NEXT GEN MOBILE AI
🌐DNA TEST FIRM : 2.1 MILLION AFFECTED BY LEGACY DATABASE HACKDNA TEST FIRM : 2.1 MILLION AFFECTED BY LEGACY DATABASE HACK
🌐MICROSOFT EXCHANGE SERVERS HACKED TO DEPLOY BLACKBYTE RANSOMWARE
🌐THOUSANDS OF HACKED CANADIAN CREDIT CARDS FOR SALE ON DARK WEBTHOUSANDS OF HACKED CANADIAN CREDIT CARDS FOR SALE ON DARK WEB
🌐SAUDI ARABIA SHOWCASES ITS TECH AMBITIONS AS @HACK NAMED 'LARGEST CYBERSECURITY EVENT OF 2021'
🌐DEFI HACK:$31 MILLION STOLEN FROM MonoX PLATFORM ON POLYGON AND ETHEREUM
🌐NEW CYBER CRIME POLICE STATIONS TO START FUNCTIONING IN EACH POLICE DISTRICT IN DELHI FROM 30 NOV 2021
DO FOLLOW @cybermonkeyofficials ON INSTAGRAM TO LEARN MORE
LINK TO OUR NEWS CHANNEL
https://www.instagram.com/p/CW-larLFFsc/?utm_medium=copy_link
TELEGRAM SUPPORT
https://t.me/cybermonkeyofficials
Forwarded from CYBERMONKEY BACKUP
@cybermonkeyofficial Forensic Science (1).pdf
90.2 KB
FORENSIC SCIENCE
Credits - @cybermonkeyofficials
{Section 52 of the Copyright Act, 1957 stipulates permissible uses of the Copyright without specific authorization from the author. Therefore, the said Section allows legitimate use of the copyrighted work for educational, scientific and cultural advancement of the society}
✍BALLISTICS AND FIREARMS
✍HOW BALLISTICS HELP IN CRIME DETECTION
IDENTIFYING A WEAPON
INVESTIGATING
✍SIX REMARKABLE WAYS GUNS CAN BE LINKED TO CRIME SCENE
✍THE FIREARM
✍FIREARM EVIDENCES THAT MAY BE FOUND
✍ HOW SAMPLES ARE COLLECTED
✍SOURCES CARRYING FIREARM EVIDENCES
✍ BULLETS
✍IDENTIFICATION AND EVALUATION
✍CASE STUDIES
Previous Notes are Uploaded in -
https://t.me/backupcybermonkeyofficials
INSTAGRAM SUPPORT
https://www.instagram.com/p/CQvl6PPDPQy/?utm_medium=share_sheet
TELEGRAM SUPPORT
https://t.me/cybermonkeyofficials
Credits - @cybermonkeyofficials
{Section 52 of the Copyright Act, 1957 stipulates permissible uses of the Copyright without specific authorization from the author. Therefore, the said Section allows legitimate use of the copyrighted work for educational, scientific and cultural advancement of the society}
✍BALLISTICS AND FIREARMS
✍HOW BALLISTICS HELP IN CRIME DETECTION
IDENTIFYING A WEAPON
INVESTIGATING
✍SIX REMARKABLE WAYS GUNS CAN BE LINKED TO CRIME SCENE
✍THE FIREARM
✍FIREARM EVIDENCES THAT MAY BE FOUND
✍ HOW SAMPLES ARE COLLECTED
✍SOURCES CARRYING FIREARM EVIDENCES
✍ BULLETS
✍IDENTIFICATION AND EVALUATION
✍CASE STUDIES
Previous Notes are Uploaded in -
https://t.me/backupcybermonkeyofficials
INSTAGRAM SUPPORT
https://www.instagram.com/p/CQvl6PPDPQy/?utm_medium=share_sheet
TELEGRAM SUPPORT
https://t.me/cybermonkeyofficials
*Want to Learn/Start With Ethical Hacking...?* 🤔
_Don't Worry 😉😌_
*CYBRITEX SECURITY is Introducing....*
*_The Hacker's Path_* Training Course To Start with _Ethical Hacking & More..._
This Training Course will be provide you :-
*• Live Classes*
*• Hands on Practice*
*• Clearance of Doubts &*
*• A skill Certification*
So, What are you Waiting for...? 🤷🏻♂️
Don't miss this opportunity and get Enrolled Now...👇🏻
*What our Students Says ?* 😃
•> https://cybritex.com/index.php/courses/
Demo Video-- https://share.vidyard.com/watch/wpfAGEZd8Kpu2G6TT9Fd9t?
*Registration Link:-* rzp.io/l/ZFlmPE0p4G
For More Information *Contact Us* here :- https://wa.me/+919728577879
_P.S - Forward and help your friends, if you are not interested..._
_Don't Worry 😉😌_
*CYBRITEX SECURITY is Introducing....*
*_The Hacker's Path_* Training Course To Start with _Ethical Hacking & More..._
This Training Course will be provide you :-
*• Live Classes*
*• Hands on Practice*
*• Clearance of Doubts &*
*• A skill Certification*
So, What are you Waiting for...? 🤷🏻♂️
Don't miss this opportunity and get Enrolled Now...👇🏻
*What our Students Says ?* 😃
•> https://cybritex.com/index.php/courses/
Demo Video-- https://share.vidyard.com/watch/wpfAGEZd8Kpu2G6TT9Fd9t?
*Registration Link:-* rzp.io/l/ZFlmPE0p4G
For More Information *Contact Us* here :- https://wa.me/+919728577879
_P.S - Forward and help your friends, if you are not interested..._
Forwarded from netslutter ™ (Rœt)
Please open Telegram to view this post
VIEW IN TELEGRAM
FROM INTERNET
1)Easy SQLi in Amazon subsidiary using Sqlmap
https://hector0x.medium.com/easy-sqli-in-amazon-subsidiary-using-sqlmap-ff469013671b
2)Bypass File Upload Restrictions
How to Get a Shell on a Website using a File [Tutorial]
https://technicalsurendra.medium.com/bypass-file-upload-restrictions-f30c88e1fccb
3)Cross-site request forgery (CSRF)
https://medium.com/@shubhamkumarks1999/cross-site-request-forgery-csrf-403574f8aded
4)How to Exploit Public Firebase Realtime Database using REST API
https://masturf.medium.com/how-to-exploit-firebase-realtime-database-using-rest-api-34885160fa55
5)CVE-2021-21234 Spring Boot Actuator Logview Directory Traversal
https://pyn3rd.github.io/2021/10/25/CVE-2021-21234-Spring-Boot-Actuator-Logview-Directory-Traversal/
6)Awesome PostgreSQL
https://reconshell.com/awesome-postgresql/
7)Web cache poisoning bug discovered in Symfony PHP framework
https://portswigger.net/daily-swig/web-cache-poisoning-bug-discovered-in-symfony-php-framework
8)Artificial Intelligence
https://aryacollegeludhiana.in/E_BOOK/computer/Artificial_Intelligence.pdf
9)Domain Lowering - A Technique to by pass Same Origin Policy (SOP)
https://securityzines.com/flyers/dl.html?utm_campaign=Security%20Zines&utm_medium=email&utm_source=Revue%20newsletter
:OSCP EXAM:
1)OSCP Exam Change
https://www.offensive-security.com/offsec/oscp-exam-structure/?utm_content=189109584&utm_medium=social&utm_source=facebook&hss_channel=fbp-132187200151961
2)2022 OSCP EXAM CHANGES - Goodbye Buffer Overflow, Hello Active Directory
https://www.youtube.com/watch?v=uvqdSGlwEkA
1)Easy SQLi in Amazon subsidiary using Sqlmap
https://hector0x.medium.com/easy-sqli-in-amazon-subsidiary-using-sqlmap-ff469013671b
2)Bypass File Upload Restrictions
How to Get a Shell on a Website using a File [Tutorial]
https://technicalsurendra.medium.com/bypass-file-upload-restrictions-f30c88e1fccb
3)Cross-site request forgery (CSRF)
https://medium.com/@shubhamkumarks1999/cross-site-request-forgery-csrf-403574f8aded
4)How to Exploit Public Firebase Realtime Database using REST API
https://masturf.medium.com/how-to-exploit-firebase-realtime-database-using-rest-api-34885160fa55
5)CVE-2021-21234 Spring Boot Actuator Logview Directory Traversal
https://pyn3rd.github.io/2021/10/25/CVE-2021-21234-Spring-Boot-Actuator-Logview-Directory-Traversal/
6)Awesome PostgreSQL
https://reconshell.com/awesome-postgresql/
7)Web cache poisoning bug discovered in Symfony PHP framework
https://portswigger.net/daily-swig/web-cache-poisoning-bug-discovered-in-symfony-php-framework
8)Artificial Intelligence
https://aryacollegeludhiana.in/E_BOOK/computer/Artificial_Intelligence.pdf
9)Domain Lowering - A Technique to by pass Same Origin Policy (SOP)
https://securityzines.com/flyers/dl.html?utm_campaign=Security%20Zines&utm_medium=email&utm_source=Revue%20newsletter
:OSCP EXAM:
1)OSCP Exam Change
https://www.offensive-security.com/offsec/oscp-exam-structure/?utm_content=189109584&utm_medium=social&utm_source=facebook&hss_channel=fbp-132187200151961
2)2022 OSCP EXAM CHANGES - Goodbye Buffer Overflow, Hello Active Directory
https://www.youtube.com/watch?v=uvqdSGlwEkA
Medium
Easy SQLi in Amazon subsidiary using Sqlmap
Hey all,
All about OSCP
Offensive Security Certified Professional is an ethical hacking certification offered by Offensive Security that teaches penetration testing methodologies and the use of the tools included with the Kali Linux distribution.
OSCP Buffer overflow concepts and tutorials
http://strongcourage.github.io/2020/04/19/bof.html
OSCP Cheatsheets:)
https://github.com/slyth11907/Cheatsheets
Pentest-Cheat-Sheets
This repo has a collection of snippets of codes and commands to help our lives! The main purpose is not be a crutch, this is a way to do not waste our precious time! This repo also helps who trying to get OSCP. You'll find many ways to do something without Metasploit Framework.
Link:-https://github.com/Kitsun3Sec/Pentest-Cheat-Sheets
Hacking/OSCP cheatsheet
https://ceso.github.io/posts/2020/04/hacking/oscp-cheatsheet/
All about OSCP:-
https://oscp.infosecsanyam.in/
OSCP preparation
https://github.com/rewardone/OSCPRepo
https://github.com/0x4D31/awesome-oscp#resources
https://ired.team/offensive-security-experiments/
OSCP methodology:-
https://paper.dropbox.com/doc/OSCP-Methodology-EnVX7VSiNGZ2K2QxCZD7Q
https://github.com/OlivierLaflamme/Cheatsheet-God
https://blog.g0tmi1k.com/2011/08/basic-linux-privilege-escalation/
https://github.com/foobarto/redteam-notebook/blob/master/README.md
https://github.com/RustyShackleford221/OSCP-Prep
https://johnjhacking.com/blog/the-oscp-preperation-guide-2020/
Share With OSCP Learners 🙏🏻
❤️❤️ Enjoy and Share ❤️❤️
Support Us ❤️
Channel : @freelearningtech
Group : @freelearningtech21
Website : https://freelearningtech.in/
Offensive Security Certified Professional is an ethical hacking certification offered by Offensive Security that teaches penetration testing methodologies and the use of the tools included with the Kali Linux distribution.
OSCP Buffer overflow concepts and tutorials
http://strongcourage.github.io/2020/04/19/bof.html
OSCP Cheatsheets:)
https://github.com/slyth11907/Cheatsheets
Pentest-Cheat-Sheets
This repo has a collection of snippets of codes and commands to help our lives! The main purpose is not be a crutch, this is a way to do not waste our precious time! This repo also helps who trying to get OSCP. You'll find many ways to do something without Metasploit Framework.
Link:-https://github.com/Kitsun3Sec/Pentest-Cheat-Sheets
Hacking/OSCP cheatsheet
https://ceso.github.io/posts/2020/04/hacking/oscp-cheatsheet/
All about OSCP:-
https://oscp.infosecsanyam.in/
OSCP preparation
https://github.com/rewardone/OSCPRepo
https://github.com/0x4D31/awesome-oscp#resources
https://ired.team/offensive-security-experiments/
OSCP methodology:-
https://paper.dropbox.com/doc/OSCP-Methodology-EnVX7VSiNGZ2K2QxCZD7Q
https://github.com/OlivierLaflamme/Cheatsheet-God
https://blog.g0tmi1k.com/2011/08/basic-linux-privilege-escalation/
https://github.com/foobarto/redteam-notebook/blob/master/README.md
https://github.com/RustyShackleford221/OSCP-Prep
https://johnjhacking.com/blog/the-oscp-preperation-guide-2020/
Share With OSCP Learners 🙏🏻
❤️❤️ Enjoy and Share ❤️❤️
Support Us ❤️
Channel : @freelearningtech
Group : @freelearningtech21
Website : https://freelearningtech.in/
strongcourage.github.io
Manh-Dung Nguyen - OSCP/OSCE Buffer Overflows Exploitation
Tutorials / Methodologies https://github.com/gh0x0st/Buffer_Overflow https://infosecsanyam261.gitbook.io/tryharder/buffer-overflow https://blog.own.sh/introd...
🎲What Is RansomWare ? 🎲
Ransomware Is Sophisticated Piece of Malware That Blocks The Victims Access To His/Her Files, And The Only Way To Regain The Access To The Files Is To Pay The Ransome Or Get The Decryption Key
🧸There Are Two Types Of Ransomware In Circulation :-
🌻Encrypting Ransomware
Which Incorporates Advanced Encryption Algorithms.
It Is Designed To Block System
Files And Demand Payment Tk Provide The Victim With The Key That Can Decrypt The Blocked Content
🃏Examples :- CryptoLocker, Locky CryptoWall And More
🌻 Locker Ransomware
Which Locks The Victim Out Of The Operating System And Making It Impossible Access The Desktop And Any Apps Or Files.
⊰᯽⊱┈──╌❊╌──┈⊰᯽⊱
Top 3 Biggest Ransomware Attacks In The Histroy :-
1.WannaCry ( Encrypting Ransomware )
2 .Tesla Crypt
3. Not Petya ( Locker Ransomware)
Ransomware Is Sophisticated Piece of Malware That Blocks The Victims Access To His/Her Files, And The Only Way To Regain The Access To The Files Is To Pay The Ransome Or Get The Decryption Key
🧸There Are Two Types Of Ransomware In Circulation :-
🌻Encrypting Ransomware
Which Incorporates Advanced Encryption Algorithms.
It Is Designed To Block System
Files And Demand Payment Tk Provide The Victim With The Key That Can Decrypt The Blocked Content
🃏Examples :- CryptoLocker, Locky CryptoWall And More
🌻 Locker Ransomware
Which Locks The Victim Out Of The Operating System And Making It Impossible Access The Desktop And Any Apps Or Files.
⊰᯽⊱┈──╌❊╌──┈⊰᯽⊱
Top 3 Biggest Ransomware Attacks In The Histroy :-
1.WannaCry ( Encrypting Ransomware )
2 .Tesla Crypt
3. Not Petya ( Locker Ransomware)