Forwarded from Network Slutter โข ๐ฅท
Please open Telegram to view this post
VIEW IN TELEGRAM
Forwarded from Network Slutter โข ๐ฅท
Please open Telegram to view this post
VIEW IN TELEGRAM
Forwarded from Network Slutter โข ๐ฅท
Please open Telegram to view this post
VIEW IN TELEGRAM
Forwarded from CYBERMONKEYOFFICIAL
LATEST TECHNOLOGY AND CYBERNEWS
BY @cybermonkeyofficials
๐CHINESE COULD HACK DATA FOR FUTURE QUANTUM DECRYPTION,REPORT WARNS
๐APPLE SAYS IT WILL NOTIFY USERS WHOSE IPHONES WERE HACKED BY SPYWARE
๐PANASONIC CONFIRMS DATA BREACH AFTER HACKERS ACCESS INTERNAL NETWORK
๐AUSTRALIAN LAW ENABLES STATE-AUTHORISED HACKING AND SURVEILLANCE
๐MICROSOFT WINDOWS 10 AND 11 USERS WARNED TO URGENTLY UPDATE SOFTWARE NOW AS HACKERS EXPLOIT NEW MALWARE
๐MUSK'S STARLINK STOPS PRE-BOOKING IN INDIA
๐VULNERABILITY REPORTED ON CDSL VENTURES WEBSITE RESOLVED NOW :MOS FINANCE
๐RUSSIA FINES GOOGLE 3 MILLION ROUBLES FOR NOT DELETING BANNED CONTENT
๐RELIANCE JIO PREPARING JIO TV AND A JIO TABLET FOR THE INDIAN MARKET TO BE RELEASED IN 2022
๐RUSSIA SAYS TWITTER MOBILE SLOWDOWN TO REMAIN UNTIL ALL BANNED CONTENT IS REMOVED
๐JACK DORSEY STEPS DOWN AS TWITTER CEO, PARAG AGARWAL TO REPLACE HIM
๐META'S ACQUISITION OF GIPHY SET TO BE BLOCKED BY UK REGULATOR
DO FOLLOW @cybermonkeyofficials ON INSTAGRAM TO LEARN MORE
LINK TO OUR NEWS CHANNEL
https://www.instagram.com/p/CW770lVl1Xg/?utm_medium=copy_link
TELEGRAM SUPPORT
https://t.me/cybermonkeyofficials
BY @cybermonkeyofficials
๐CHINESE COULD HACK DATA FOR FUTURE QUANTUM DECRYPTION,REPORT WARNS
๐APPLE SAYS IT WILL NOTIFY USERS WHOSE IPHONES WERE HACKED BY SPYWARE
๐PANASONIC CONFIRMS DATA BREACH AFTER HACKERS ACCESS INTERNAL NETWORK
๐AUSTRALIAN LAW ENABLES STATE-AUTHORISED HACKING AND SURVEILLANCE
๐MICROSOFT WINDOWS 10 AND 11 USERS WARNED TO URGENTLY UPDATE SOFTWARE NOW AS HACKERS EXPLOIT NEW MALWARE
๐MUSK'S STARLINK STOPS PRE-BOOKING IN INDIA
๐VULNERABILITY REPORTED ON CDSL VENTURES WEBSITE RESOLVED NOW :MOS FINANCE
๐RUSSIA FINES GOOGLE 3 MILLION ROUBLES FOR NOT DELETING BANNED CONTENT
๐RELIANCE JIO PREPARING JIO TV AND A JIO TABLET FOR THE INDIAN MARKET TO BE RELEASED IN 2022
๐RUSSIA SAYS TWITTER MOBILE SLOWDOWN TO REMAIN UNTIL ALL BANNED CONTENT IS REMOVED
๐JACK DORSEY STEPS DOWN AS TWITTER CEO, PARAG AGARWAL TO REPLACE HIM
๐META'S ACQUISITION OF GIPHY SET TO BE BLOCKED BY UK REGULATOR
DO FOLLOW @cybermonkeyofficials ON INSTAGRAM TO LEARN MORE
LINK TO OUR NEWS CHANNEL
https://www.instagram.com/p/CW770lVl1Xg/?utm_medium=copy_link
TELEGRAM SUPPORT
https://t.me/cybermonkeyofficials
Forwarded from CYBERMONKEY BACKUP
@cybermonkeyofficials Cybe Crime Laws in India 3 (1).pdf
41.4 KB
CYBER CRIME LAWS IN INDIA
Credits - @cybermonkeyofficials
{Section 52 of the Copyright Act, 1957 stipulates permissible uses of the Copyright without specific authorization from the author. Therefore, the said Section allows legitimate use of the copyrighted work for educational, scientific and cultural advancement of the society}
โObservations on ITA AND ITAA
โAWARENESS
โJURISDICTION
โEVIDENCES
โNON COVERAGE OF COMPUTER CRIMES
โ PREVENTION OF MONEY LAUNDERING
โE-RECORDS MAINTENANCE POLICY FOR BANKS
โLEGISLATION IN OTHER NATIONS
โCONCLUSION
Previous Notes are Uploaded in -
https://t.me/backupcybermonkeyofficials
INSTAGRAM SUPPORT
https://www.instagram.com/p/CQvl6PPDPQy/?utm_medium=share_sheet
TELEGRAM SUPPORT
https://t.me/cybermonkeyofficials
Credits - @cybermonkeyofficials
{Section 52 of the Copyright Act, 1957 stipulates permissible uses of the Copyright without specific authorization from the author. Therefore, the said Section allows legitimate use of the copyrighted work for educational, scientific and cultural advancement of the society}
โObservations on ITA AND ITAA
โAWARENESS
โJURISDICTION
โEVIDENCES
โNON COVERAGE OF COMPUTER CRIMES
โ PREVENTION OF MONEY LAUNDERING
โE-RECORDS MAINTENANCE POLICY FOR BANKS
โLEGISLATION IN OTHER NATIONS
โCONCLUSION
Previous Notes are Uploaded in -
https://t.me/backupcybermonkeyofficials
INSTAGRAM SUPPORT
https://www.instagram.com/p/CQvl6PPDPQy/?utm_medium=share_sheet
TELEGRAM SUPPORT
https://t.me/cybermonkeyofficials
https://drive.google.com/drive/u/0/folders/12Mvq6kE2HJDwN2CZhEGWizyWt87YunkU
โค๏ธโค๏ธ Enjoy and Share โค๏ธโค๏ธ
Support Us โค๏ธ
Channel : @freelearningtech
Group : @freelearningtech21
Website : https://freelearningtech.in/
โค๏ธโค๏ธ Enjoy and Share โค๏ธโค๏ธ
Support Us โค๏ธ
Channel : @freelearningtech
Group : @freelearningtech21
Website : https://freelearningtech.in/
Forwarded from CYBERMONKEYOFFICIAL
LATEST TECHNOLOGY AND CYBERNEWS
BY @cybermonkeyofficials
๐AIRTEL HOLD'S INDIA'S FIRST 5G TRIAL IN 700 MHZ BAND WITH NOKIA
๐VIRTUAL LAND SELLS FOR 32 CRORE IN MOST EXPENSIVE 'METAVERSA' PROPERTY SALE
๐CHINA PLANS TO BAN LOOPHOLE USED BY TECH FIRMS FOR FOREIGN IPOs
๐OVER 9000 COMPLAINTS OF CYBERFRAUDS RECEIVED ON NATIONAL CONSUMER HELPLINE IN FY21
๐QUALCOMM, GOOGLE CLOUD COLLABORATE TO CREATE NEXT GEN MOBILE AI
๐DNA TEST FIRM : 2.1 MILLION AFFECTED BY LEGACY DATABASE HACKDNA TEST FIRM : 2.1 MILLION AFFECTED BY LEGACY DATABASE HACK
๐MICROSOFT EXCHANGE SERVERS HACKED TO DEPLOY BLACKBYTE RANSOMWARE
๐THOUSANDS OF HACKED CANADIAN CREDIT CARDS FOR SALE ON DARK WEBTHOUSANDS OF HACKED CANADIAN CREDIT CARDS FOR SALE ON DARK WEB
๐SAUDI ARABIA SHOWCASES ITS TECH AMBITIONS AS @HACK NAMED 'LARGEST CYBERSECURITY EVENT OF 2021'
๐DEFI HACK:$31 MILLION STOLEN FROM MonoX PLATFORM ON POLYGON AND ETHEREUM
๐NEW CYBER CRIME POLICE STATIONS TO START FUNCTIONING IN EACH POLICE DISTRICT IN DELHI FROM 30 NOV 2021
DO FOLLOW @cybermonkeyofficials ON INSTAGRAM TO LEARN MORE
LINK TO OUR NEWS CHANNEL
https://www.instagram.com/p/CW-larLFFsc/?utm_medium=copy_link
TELEGRAM SUPPORT
https://t.me/cybermonkeyofficials
BY @cybermonkeyofficials
๐AIRTEL HOLD'S INDIA'S FIRST 5G TRIAL IN 700 MHZ BAND WITH NOKIA
๐VIRTUAL LAND SELLS FOR 32 CRORE IN MOST EXPENSIVE 'METAVERSA' PROPERTY SALE
๐CHINA PLANS TO BAN LOOPHOLE USED BY TECH FIRMS FOR FOREIGN IPOs
๐OVER 9000 COMPLAINTS OF CYBERFRAUDS RECEIVED ON NATIONAL CONSUMER HELPLINE IN FY21
๐QUALCOMM, GOOGLE CLOUD COLLABORATE TO CREATE NEXT GEN MOBILE AI
๐DNA TEST FIRM : 2.1 MILLION AFFECTED BY LEGACY DATABASE HACKDNA TEST FIRM : 2.1 MILLION AFFECTED BY LEGACY DATABASE HACK
๐MICROSOFT EXCHANGE SERVERS HACKED TO DEPLOY BLACKBYTE RANSOMWARE
๐THOUSANDS OF HACKED CANADIAN CREDIT CARDS FOR SALE ON DARK WEBTHOUSANDS OF HACKED CANADIAN CREDIT CARDS FOR SALE ON DARK WEB
๐SAUDI ARABIA SHOWCASES ITS TECH AMBITIONS AS @HACK NAMED 'LARGEST CYBERSECURITY EVENT OF 2021'
๐DEFI HACK:$31 MILLION STOLEN FROM MonoX PLATFORM ON POLYGON AND ETHEREUM
๐NEW CYBER CRIME POLICE STATIONS TO START FUNCTIONING IN EACH POLICE DISTRICT IN DELHI FROM 30 NOV 2021
DO FOLLOW @cybermonkeyofficials ON INSTAGRAM TO LEARN MORE
LINK TO OUR NEWS CHANNEL
https://www.instagram.com/p/CW-larLFFsc/?utm_medium=copy_link
TELEGRAM SUPPORT
https://t.me/cybermonkeyofficials
Forwarded from CYBERMONKEY BACKUP
@cybermonkeyofficial Forensic Science (1).pdf
90.2 KB
FORENSIC SCIENCE
Credits - @cybermonkeyofficials
{Section 52 of the Copyright Act, 1957 stipulates permissible uses of the Copyright without specific authorization from the author. Therefore, the said Section allows legitimate use of the copyrighted work for educational, scientific and cultural advancement of the society}
โBALLISTICS AND FIREARMS
โHOW BALLISTICS HELP IN CRIME DETECTION
IDENTIFYING A WEAPON
INVESTIGATING
โSIX REMARKABLE WAYS GUNS CAN BE LINKED TO CRIME SCENE
โTHE FIREARM
โFIREARM EVIDENCES THAT MAY BE FOUND
โ HOW SAMPLES ARE COLLECTED
โSOURCES CARRYING FIREARM EVIDENCES
โ BULLETS
โIDENTIFICATION AND EVALUATION
โCASE STUDIES
Previous Notes are Uploaded in -
https://t.me/backupcybermonkeyofficials
INSTAGRAM SUPPORT
https://www.instagram.com/p/CQvl6PPDPQy/?utm_medium=share_sheet
TELEGRAM SUPPORT
https://t.me/cybermonkeyofficials
Credits - @cybermonkeyofficials
{Section 52 of the Copyright Act, 1957 stipulates permissible uses of the Copyright without specific authorization from the author. Therefore, the said Section allows legitimate use of the copyrighted work for educational, scientific and cultural advancement of the society}
โBALLISTICS AND FIREARMS
โHOW BALLISTICS HELP IN CRIME DETECTION
IDENTIFYING A WEAPON
INVESTIGATING
โSIX REMARKABLE WAYS GUNS CAN BE LINKED TO CRIME SCENE
โTHE FIREARM
โFIREARM EVIDENCES THAT MAY BE FOUND
โ HOW SAMPLES ARE COLLECTED
โSOURCES CARRYING FIREARM EVIDENCES
โ BULLETS
โIDENTIFICATION AND EVALUATION
โCASE STUDIES
Previous Notes are Uploaded in -
https://t.me/backupcybermonkeyofficials
INSTAGRAM SUPPORT
https://www.instagram.com/p/CQvl6PPDPQy/?utm_medium=share_sheet
TELEGRAM SUPPORT
https://t.me/cybermonkeyofficials
*Want to Learn/Start With Ethical Hacking...?* ๐ค
_Don't Worry ๐๐_
*CYBRITEX SECURITY is Introducing....*
*_The Hacker's Path_* Training Course To Start with _Ethical Hacking & More..._
This Training Course will be provide you :-
*โข Live Classes*
*โข Hands on Practice*
*โข Clearance of Doubts &*
*โข A skill Certification*
So, What are you Waiting for...? ๐คท๐ปโโ๏ธ
Don't miss this opportunity and get Enrolled Now...๐๐ป
*What our Students Says ?* ๐
โข> https://cybritex.com/index.php/courses/
Demo Video-- https://share.vidyard.com/watch/wpfAGEZd8Kpu2G6TT9Fd9t?
*Registration Link:-* rzp.io/l/ZFlmPE0p4G
For More Information *Contact Us* here :- https://wa.me/+919728577879
_P.S - Forward and help your friends, if you are not interested..._
_Don't Worry ๐๐_
*CYBRITEX SECURITY is Introducing....*
*_The Hacker's Path_* Training Course To Start with _Ethical Hacking & More..._
This Training Course will be provide you :-
*โข Live Classes*
*โข Hands on Practice*
*โข Clearance of Doubts &*
*โข A skill Certification*
So, What are you Waiting for...? ๐คท๐ปโโ๏ธ
Don't miss this opportunity and get Enrolled Now...๐๐ป
*What our Students Says ?* ๐
โข> https://cybritex.com/index.php/courses/
Demo Video-- https://share.vidyard.com/watch/wpfAGEZd8Kpu2G6TT9Fd9t?
*Registration Link:-* rzp.io/l/ZFlmPE0p4G
For More Information *Contact Us* here :- https://wa.me/+919728577879
_P.S - Forward and help your friends, if you are not interested..._
Forwarded from netslutter โข (Rลt)
Please open Telegram to view this post
VIEW IN TELEGRAM
FROM INTERNET
1)Easy SQLi in Amazon subsidiary using Sqlmap
https://hector0x.medium.com/easy-sqli-in-amazon-subsidiary-using-sqlmap-ff469013671b
2)Bypass File Upload Restrictions
How to Get a Shell on a Website using a File [Tutorial]
https://technicalsurendra.medium.com/bypass-file-upload-restrictions-f30c88e1fccb
3)Cross-site request forgery (CSRF)
https://medium.com/@shubhamkumarks1999/cross-site-request-forgery-csrf-403574f8aded
4)How to Exploit Public Firebase Realtime Database using REST API
https://masturf.medium.com/how-to-exploit-firebase-realtime-database-using-rest-api-34885160fa55
5)CVE-2021-21234 Spring Boot Actuator Logview Directory Traversal
https://pyn3rd.github.io/2021/10/25/CVE-2021-21234-Spring-Boot-Actuator-Logview-Directory-Traversal/
6)Awesome PostgreSQL
https://reconshell.com/awesome-postgresql/
7)Web cache poisoning bug discovered in Symfony PHP framework
https://portswigger.net/daily-swig/web-cache-poisoning-bug-discovered-in-symfony-php-framework
8)Artificial Intelligence
https://aryacollegeludhiana.in/E_BOOK/computer/Artificial_Intelligence.pdf
9)Domain Lowering - A Technique to by pass Same Origin Policy (SOP)
https://securityzines.com/flyers/dl.html?utm_campaign=Security%20Zines&utm_medium=email&utm_source=Revue%20newsletter
:OSCP EXAM:
1)OSCP Exam Change
https://www.offensive-security.com/offsec/oscp-exam-structure/?utm_content=189109584&utm_medium=social&utm_source=facebook&hss_channel=fbp-132187200151961
2)2022 OSCP EXAM CHANGES - Goodbye Buffer Overflow, Hello Active Directory
https://www.youtube.com/watch?v=uvqdSGlwEkA
1)Easy SQLi in Amazon subsidiary using Sqlmap
https://hector0x.medium.com/easy-sqli-in-amazon-subsidiary-using-sqlmap-ff469013671b
2)Bypass File Upload Restrictions
How to Get a Shell on a Website using a File [Tutorial]
https://technicalsurendra.medium.com/bypass-file-upload-restrictions-f30c88e1fccb
3)Cross-site request forgery (CSRF)
https://medium.com/@shubhamkumarks1999/cross-site-request-forgery-csrf-403574f8aded
4)How to Exploit Public Firebase Realtime Database using REST API
https://masturf.medium.com/how-to-exploit-firebase-realtime-database-using-rest-api-34885160fa55
5)CVE-2021-21234 Spring Boot Actuator Logview Directory Traversal
https://pyn3rd.github.io/2021/10/25/CVE-2021-21234-Spring-Boot-Actuator-Logview-Directory-Traversal/
6)Awesome PostgreSQL
https://reconshell.com/awesome-postgresql/
7)Web cache poisoning bug discovered in Symfony PHP framework
https://portswigger.net/daily-swig/web-cache-poisoning-bug-discovered-in-symfony-php-framework
8)Artificial Intelligence
https://aryacollegeludhiana.in/E_BOOK/computer/Artificial_Intelligence.pdf
9)Domain Lowering - A Technique to by pass Same Origin Policy (SOP)
https://securityzines.com/flyers/dl.html?utm_campaign=Security%20Zines&utm_medium=email&utm_source=Revue%20newsletter
:OSCP EXAM:
1)OSCP Exam Change
https://www.offensive-security.com/offsec/oscp-exam-structure/?utm_content=189109584&utm_medium=social&utm_source=facebook&hss_channel=fbp-132187200151961
2)2022 OSCP EXAM CHANGES - Goodbye Buffer Overflow, Hello Active Directory
https://www.youtube.com/watch?v=uvqdSGlwEkA
Medium
Easy SQLi in Amazon subsidiary using Sqlmap
Hey all,
All about OSCP
Offensive Security Certified Professional is an ethical hacking certification offered by Offensive Security that teaches penetration testing methodologies and the use of the tools included with the Kali Linux distribution.
OSCP Buffer overflow concepts and tutorials
http://strongcourage.github.io/2020/04/19/bof.html
OSCP Cheatsheets:)
https://github.com/slyth11907/Cheatsheets
Pentest-Cheat-Sheets
This repo has a collection of snippets of codes and commands to help our lives! The main purpose is not be a crutch, this is a way to do not waste our precious time! This repo also helps who trying to get OSCP. You'll find many ways to do something without Metasploit Framework.
Link:-https://github.com/Kitsun3Sec/Pentest-Cheat-Sheets
Hacking/OSCP cheatsheet
https://ceso.github.io/posts/2020/04/hacking/oscp-cheatsheet/
All about OSCP:-
https://oscp.infosecsanyam.in/
OSCP preparation
https://github.com/rewardone/OSCPRepo
https://github.com/0x4D31/awesome-oscp#resources
https://ired.team/offensive-security-experiments/
OSCP methodology:-
https://paper.dropbox.com/doc/OSCP-Methodology-EnVX7VSiNGZ2K2QxCZD7Q
https://github.com/OlivierLaflamme/Cheatsheet-God
https://blog.g0tmi1k.com/2011/08/basic-linux-privilege-escalation/
https://github.com/foobarto/redteam-notebook/blob/master/README.md
https://github.com/RustyShackleford221/OSCP-Prep
https://johnjhacking.com/blog/the-oscp-preperation-guide-2020/
Share With OSCP Learners ๐๐ป
โค๏ธโค๏ธ Enjoy and Share โค๏ธโค๏ธ
Support Us โค๏ธ
Channel : @freelearningtech
Group : @freelearningtech21
Website : https://freelearningtech.in/
Offensive Security Certified Professional is an ethical hacking certification offered by Offensive Security that teaches penetration testing methodologies and the use of the tools included with the Kali Linux distribution.
OSCP Buffer overflow concepts and tutorials
http://strongcourage.github.io/2020/04/19/bof.html
OSCP Cheatsheets:)
https://github.com/slyth11907/Cheatsheets
Pentest-Cheat-Sheets
This repo has a collection of snippets of codes and commands to help our lives! The main purpose is not be a crutch, this is a way to do not waste our precious time! This repo also helps who trying to get OSCP. You'll find many ways to do something without Metasploit Framework.
Link:-https://github.com/Kitsun3Sec/Pentest-Cheat-Sheets
Hacking/OSCP cheatsheet
https://ceso.github.io/posts/2020/04/hacking/oscp-cheatsheet/
All about OSCP:-
https://oscp.infosecsanyam.in/
OSCP preparation
https://github.com/rewardone/OSCPRepo
https://github.com/0x4D31/awesome-oscp#resources
https://ired.team/offensive-security-experiments/
OSCP methodology:-
https://paper.dropbox.com/doc/OSCP-Methodology-EnVX7VSiNGZ2K2QxCZD7Q
https://github.com/OlivierLaflamme/Cheatsheet-God
https://blog.g0tmi1k.com/2011/08/basic-linux-privilege-escalation/
https://github.com/foobarto/redteam-notebook/blob/master/README.md
https://github.com/RustyShackleford221/OSCP-Prep
https://johnjhacking.com/blog/the-oscp-preperation-guide-2020/
Share With OSCP Learners ๐๐ป
โค๏ธโค๏ธ Enjoy and Share โค๏ธโค๏ธ
Support Us โค๏ธ
Channel : @freelearningtech
Group : @freelearningtech21
Website : https://freelearningtech.in/
strongcourage.github.io
Manh-Dung Nguyen - OSCP/OSCE Buffer Overflows Exploitation
Tutorials / Methodologies https://github.com/gh0x0st/Buffer_Overflow https://infosecsanyam261.gitbook.io/tryharder/buffer-overflow https://blog.own.sh/introd...
๐ฒWhat Is RansomWare ? ๐ฒ
Ransomware Is Sophisticated Piece of Malware That Blocks The Victims Access To His/Her Files, And The Only Way To Regain The Access To The Files Is To Pay The Ransome Or Get The Decryption Key
๐งธThere Are Two Types Of Ransomware In Circulation :-
๐ปEncrypting Ransomware
Which Incorporates Advanced Encryption Algorithms.
It Is Designed To Block System
Files And Demand Payment Tk Provide The Victim With The Key That Can Decrypt The Blocked Content
๐Examples :- CryptoLocker, Locky CryptoWall And More
๐ป Locker Ransomware
Which Locks The Victim Out Of The Operating System And Making It Impossible Access The Desktop And Any Apps Or Files.
โฐแฏฝโฑโโโโโโโโโโฐแฏฝโฑ
Top 3 Biggest Ransomware Attacks In The Histroy :-
1.WannaCry ( Encrypting Ransomware )
2 .Tesla Crypt
3. Not Petya ( Locker Ransomware)
Ransomware Is Sophisticated Piece of Malware That Blocks The Victims Access To His/Her Files, And The Only Way To Regain The Access To The Files Is To Pay The Ransome Or Get The Decryption Key
๐งธThere Are Two Types Of Ransomware In Circulation :-
๐ปEncrypting Ransomware
Which Incorporates Advanced Encryption Algorithms.
It Is Designed To Block System
Files And Demand Payment Tk Provide The Victim With The Key That Can Decrypt The Blocked Content
๐Examples :- CryptoLocker, Locky CryptoWall And More
๐ป Locker Ransomware
Which Locks The Victim Out Of The Operating System And Making It Impossible Access The Desktop And Any Apps Or Files.
โฐแฏฝโฑโโโโโโโโโโฐแฏฝโฑ
Top 3 Biggest Ransomware Attacks In The Histroy :-
1.WannaCry ( Encrypting Ransomware )
2 .Tesla Crypt
3. Not Petya ( Locker Ransomware)
Worm virus creation tools๐๐๐๐
Don't use at host machine use on virtual machine
Rar password in breakets
https://drive.google.com/file/d/13NTSxMS8Ov0o7PasaL3aNQ-apnjk6sfy/view?usp=drivesdk
https://drive.google.com/file/d/1GRBUtBkjyFcDVaJTpLXPXJ8PaMNozZ6t/view?usp=drivesdk
โค๏ธโค๏ธ Enjoy and Share โค๏ธโค๏ธ
Support Us โค๏ธ
Channel : @freelearningtech
Group : @freelearningtech21
Website : https://freelearningtech.in/
Don't use at host machine use on virtual machine
Rar password in breakets
https://drive.google.com/file/d/13NTSxMS8Ov0o7PasaL3aNQ-apnjk6sfy/view?usp=drivesdk
https://drive.google.com/file/d/1GRBUtBkjyFcDVaJTpLXPXJ8PaMNozZ6t/view?usp=drivesdk
โค๏ธโค๏ธ Enjoy and Share โค๏ธโค๏ธ
Support Us โค๏ธ
Channel : @freelearningtech
Group : @freelearningtech21
Website : https://freelearningtech.in/
๐1
Forwarded from netslutter โข (Rลt)
Please open Telegram to view this post
VIEW IN TELEGRAM
Forwarded from CYBERMONKEYOFFICIAL
LATEST TECHNOLOGY AND CYBERNEWS
BY @cybermonkeyofficials
๐AMAZON TO SHUT DOWN WEBSITE RANKING SITE ALEXA.COM IN MAY 2022
๐WHATSAPP LAUNCHES CRYPTOCURRENCY PAYMENTS PILOT IN US
๐APPLE SUED OVER BROKEN WATCH SCREENS THAT INJURED CUSTOMERS IN US
๐TESLA ALLOWS US USERS TO PLAY VIDEO GAMES IN MOVING CARS
๐HACKERS ATTACK BRAZIL'S HEALTH MINISTRY,DELETE VACCINATION DATA
๐GOOGLE EXTENDS NEW APP STORE POLICY DEADLINE IN INDIA TO OCT 2022
๐CHINA REMOVES 106 APPS FROM APP STORES CITING PRIVACY VIOLATIONS
๐IMPRISONED SILK ROAD FIRST NFT SELLS FOR $6.2 MILLION
๐97.23 TERABYTES/MONTH DATA BEING CONSUMED AT 6071 RAILWAY STATIONS THAT HAVE FREE WIFI:GOVT
๐TRAI ASKS BROADCASTERS AND DPOs TO COMPLY WITH IA REGULATIONS
๐DOT MOVES NCLAT AGAINST RESOLUTION OF VIDEOCON;CLAIMS RS 881.92 CR DUE FROM VIDEOCON TELECOM
๐GOOGLE TO BRING ANDROID GAMES TO WINDOWS IN 2022: REPORT
๐GOVERNMENT TO IMPLEMENT MOBILE PRIVACY AND SECURITY INITIATIVE:RAJESH PANT
๐SAMSUNG BUSTS COUNTERFEIT TV RACKET IN DELHI
๐SERIOUS BUG PUTS APPLE ICLOUD TWITTER, MINECRAFT AT HACKING THREAT
๐CHINESE HACKERS TARGETED GOVERNMENT AND PRIVATE SECTOR ENTITIES COUNTRIES LIKE MALAYSIA , INDONESIA AND VIETNAM:REPORT
๐HACKER IMPERSONATING CUSTOMER SUPPORT LED TO A DATA BREACH AT COX
๐HACKERS ARE TARGETING OVER A MILLION WORDPRESS SITES IN ONGOING ATTACKS
๐NEW WHITE HOUSE POLICY GIVES AGENCIES 24 HOURS TO ASSESS CYBERATTACKS OF POTENTIAL NATIONAL SECURITY CONCERN
๐KALILINUX 2021.4 RELEASED WITH SAMBA COMPATIBILITY , APPLE M1 SUPPORT , 9 NEW TOOLS
๐RUSSIA BLOCKS TOR PRIVACY SERVICE IN LATEST CENSORSHIP MOVE
๐BLACKCAT:A NEW RUST BASED RANSOMWARE MALWARE SPOTTED IN THE WILD
๐INSTAGRAM AIMS TO BRING BACK A CHRONOLOGICAL FEED IN 2022
๐NEED TIGHTER REGULATIONS TO DEAL WITH CYBER CRIMES : IT MINISTER IN LOK SABHA
๐DOT TO DEACTIVATE EXTRA SIM OF SUBSCRIBER BEYOND 9 CONNECTIONS
๐RBI TO FORM PANEL TO STUDY DIGITAL PAYMENT CHARGES
๐VODAFONE IDEA TO DEPLOY BLOCKCHAIN ENABLED ENTERPRISE PLATFORM :PARTNERS TANLA
๐CENTRAL INSTITUTE FOR INDIAN LANGUAGES , KOO COLLABORATE TO PROMOTE FAIR USE OF LANGUAGE
DO FOLLOW @cybermonkeyofficials ON INSTAGRAM TO LEARN MORE
LINK TO OUR NEWS CHANNEL
https://www.instagram.com/p/CW-larLFFsc/?utm_medium=copy_link
TELEGRAM SUPPORT
https://t.me/cybermonkeyofficials
BY @cybermonkeyofficials
๐AMAZON TO SHUT DOWN WEBSITE RANKING SITE ALEXA.COM IN MAY 2022
๐WHATSAPP LAUNCHES CRYPTOCURRENCY PAYMENTS PILOT IN US
๐APPLE SUED OVER BROKEN WATCH SCREENS THAT INJURED CUSTOMERS IN US
๐TESLA ALLOWS US USERS TO PLAY VIDEO GAMES IN MOVING CARS
๐HACKERS ATTACK BRAZIL'S HEALTH MINISTRY,DELETE VACCINATION DATA
๐GOOGLE EXTENDS NEW APP STORE POLICY DEADLINE IN INDIA TO OCT 2022
๐CHINA REMOVES 106 APPS FROM APP STORES CITING PRIVACY VIOLATIONS
๐IMPRISONED SILK ROAD FIRST NFT SELLS FOR $6.2 MILLION
๐97.23 TERABYTES/MONTH DATA BEING CONSUMED AT 6071 RAILWAY STATIONS THAT HAVE FREE WIFI:GOVT
๐TRAI ASKS BROADCASTERS AND DPOs TO COMPLY WITH IA REGULATIONS
๐DOT MOVES NCLAT AGAINST RESOLUTION OF VIDEOCON;CLAIMS RS 881.92 CR DUE FROM VIDEOCON TELECOM
๐GOOGLE TO BRING ANDROID GAMES TO WINDOWS IN 2022: REPORT
๐GOVERNMENT TO IMPLEMENT MOBILE PRIVACY AND SECURITY INITIATIVE:RAJESH PANT
๐SAMSUNG BUSTS COUNTERFEIT TV RACKET IN DELHI
๐SERIOUS BUG PUTS APPLE ICLOUD TWITTER, MINECRAFT AT HACKING THREAT
๐CHINESE HACKERS TARGETED GOVERNMENT AND PRIVATE SECTOR ENTITIES COUNTRIES LIKE MALAYSIA , INDONESIA AND VIETNAM:REPORT
๐HACKER IMPERSONATING CUSTOMER SUPPORT LED TO A DATA BREACH AT COX
๐HACKERS ARE TARGETING OVER A MILLION WORDPRESS SITES IN ONGOING ATTACKS
๐NEW WHITE HOUSE POLICY GIVES AGENCIES 24 HOURS TO ASSESS CYBERATTACKS OF POTENTIAL NATIONAL SECURITY CONCERN
๐KALILINUX 2021.4 RELEASED WITH SAMBA COMPATIBILITY , APPLE M1 SUPPORT , 9 NEW TOOLS
๐RUSSIA BLOCKS TOR PRIVACY SERVICE IN LATEST CENSORSHIP MOVE
๐BLACKCAT:A NEW RUST BASED RANSOMWARE MALWARE SPOTTED IN THE WILD
๐INSTAGRAM AIMS TO BRING BACK A CHRONOLOGICAL FEED IN 2022
๐NEED TIGHTER REGULATIONS TO DEAL WITH CYBER CRIMES : IT MINISTER IN LOK SABHA
๐DOT TO DEACTIVATE EXTRA SIM OF SUBSCRIBER BEYOND 9 CONNECTIONS
๐RBI TO FORM PANEL TO STUDY DIGITAL PAYMENT CHARGES
๐VODAFONE IDEA TO DEPLOY BLOCKCHAIN ENABLED ENTERPRISE PLATFORM :PARTNERS TANLA
๐CENTRAL INSTITUTE FOR INDIAN LANGUAGES , KOO COLLABORATE TO PROMOTE FAIR USE OF LANGUAGE
DO FOLLOW @cybermonkeyofficials ON INSTAGRAM TO LEARN MORE
LINK TO OUR NEWS CHANNEL
https://www.instagram.com/p/CW-larLFFsc/?utm_medium=copy_link
TELEGRAM SUPPORT
https://t.me/cybermonkeyofficials
๐ STORMKITTY STEALER SOURCE CODE ๐
Disclaimer - For research purposes only!
This is a Stealer + Clipper + Keylogger in one.
Stealer written on C#, logs will be sent to Telegram bot.
๐ฑ Data extraction:
โ๏ธAntiAnalysis (VirtualBox, SandBox, Debugger, VirusTotal, Any.Run)
โ๏ธGet system info (Version, CPU, GPU, RAM, IPs, BSSID, Location, Screen metrics, Installed apps)
โ๏ธChromium based browsers (passwords, credit cards, cookies, history, autofill, bookmarks)
โ๏ธFirefox based browsers (db files, cookies, history, bookmarks)
โ๏ธInternet explorer/Edge (passwords)
โ๏ธSaved wifi networks & scan networks around device (SSID, BSSID)
โ๏ธFile grabber (Documents, Images, Source codes, Databases, USB)
โ๏ธDetect banking & cryptocurrency services in browsers
โ๏ธSteam, Uplay, Battle.Net, Minecraft session
โ๏ธInstall keylogger & clipper
โ๏ธDesktop & Webcam screenshot
โ๏ธProtonVPN, OpenVPN, NordVPN
โ๏ธCryptocurrency Wallets
โ๏ธDirectories structure
โ๏ธTelegram sessions
โ๏ธOutlook accounts
โ๏ธPidgin accounts
โ๏ธSkype session
โ๏ธDiscord tokens
โ๏ธFilezilla hosts
โ๏ธProcess list
โ๏ธProduct key
โ๏ธAutorun module
๐ฅ Features:
These functions will become available in the builder only if you have autorun enabled.
๐น Keylogger:
โ The keylogger will turn on if the user is texting in the chat or using the bank's website.
๐ Clipper:
โ Clipper turns on and replaces crypto wallet addresses in the clipboard when a user makes a transaction.
๐ธ Webcam screenshots:
โ Webcam screenshots will be taken if the user is watching something obscene on the Internet.
๐ Source Code :
https://github.com/swagkarna/StormKitty
Disclaimer - For research purposes only!
This is a Stealer + Clipper + Keylogger in one.
Stealer written on C#, logs will be sent to Telegram bot.
๐ฑ Data extraction:
โ๏ธAntiAnalysis (VirtualBox, SandBox, Debugger, VirusTotal, Any.Run)
โ๏ธGet system info (Version, CPU, GPU, RAM, IPs, BSSID, Location, Screen metrics, Installed apps)
โ๏ธChromium based browsers (passwords, credit cards, cookies, history, autofill, bookmarks)
โ๏ธFirefox based browsers (db files, cookies, history, bookmarks)
โ๏ธInternet explorer/Edge (passwords)
โ๏ธSaved wifi networks & scan networks around device (SSID, BSSID)
โ๏ธFile grabber (Documents, Images, Source codes, Databases, USB)
โ๏ธDetect banking & cryptocurrency services in browsers
โ๏ธSteam, Uplay, Battle.Net, Minecraft session
โ๏ธInstall keylogger & clipper
โ๏ธDesktop & Webcam screenshot
โ๏ธProtonVPN, OpenVPN, NordVPN
โ๏ธCryptocurrency Wallets
โ๏ธDirectories structure
โ๏ธTelegram sessions
โ๏ธOutlook accounts
โ๏ธPidgin accounts
โ๏ธSkype session
โ๏ธDiscord tokens
โ๏ธFilezilla hosts
โ๏ธProcess list
โ๏ธProduct key
โ๏ธAutorun module
๐ฅ Features:
These functions will become available in the builder only if you have autorun enabled.
๐น Keylogger:
โ The keylogger will turn on if the user is texting in the chat or using the bank's website.
๐ Clipper:
โ Clipper turns on and replaces crypto wallet addresses in the clipboard when a user makes a transaction.
๐ธ Webcam screenshots:
โ Webcam screenshots will be taken if the user is watching something obscene on the Internet.
๐ Source Code :
https://github.com/swagkarna/StormKitty
โ๏ธ Web Hack Tool Links
โ๏ธ WordPress admin finder ๐ Link : https://github.com/kancoq/wpaf
โ๏ธ scannerhttps://github.com/TechnicalMujeeb/smb-scanner
โ๏ธ Heart Bleed scanner
๐ Link : https://github.com/TechnicalMujeeb/HeartBleed
โ๏ธ weevely php web shell
๐ Link : https://github.com/sunge/Weevely
โ๏ธ Webponized web shell
๐ Link : https://github.com/epinna/weevely3
โ๏ธ Nikto web scanner tool
๐ Link : https://github.com/sullo/nikto
โ๏ธ Auto Ip or domain Attacking Tool
๐ Link : https://github.com/Bhai4You/Ip-Attack
https://t.me/TheStarkArmy
โ๏ธ Click jacking vulnerability scanner
๐ Link : https://github.com/D4Vinci/Clickjacking-Tester
โ๏ธ All in 1 information gathering and web penetration tool DTect
๐ Link : https://github.com/Audi0x01/D-TECT-1
โ๏ธ Detect phishing URL
๐ Link : https://github.com/UndeadSec/checkURL
โ๏ธ Dos attack tool - Golden eye
๐ Link : https://github.com/jseidl/GoldenEye
โ๏ธ Dos attack with hulk
๐ Link : https://github.com/grafov/hulk
โ๏ธ Sql vulnerability scanner
๐ Link : https://github.com/Pure-L0G1C/SQL-scanner
https://t.me/TheStarkArmy
โ๏ธ hack website with sqlmap
๐ Link : https://github.com/sqlmapproject/sqlmap
โ๏ธ information and vulnerability scanner with striker
๐ Link : https://github.com/s0md3v/Striker
โ๏ธ web server attacking tool with dost
๐ Link : https://github.com/verluchie/dost-attack
โ๏ธ advanced multithreaded admin panel finder
๐ Link : https://github.com/s0md3v/Breacher
โ๏ธ Ssl vulnerability scanner
๐ Link : https://github.com/PortSwigger/ssl-scanner
โ๏ธ sublister - Subdomain enumeration
๐ Link : https://github.com/aboul3la/Sublist3r
โ๏ธ WordPress vulnerability scanner and attacker
๐ Link : https://github.com/wpscanteam/wpscan
โ๏ธ Hunner scanner framework
๐ Link : https://github.com/b3-v3r/Hunner
โ๏ธ Red hawk all in 1 information gathering and scanning tool
๐ Link : https://github.com/Tuhinshubhra/RED_HAWK
โ๏ธ Dos attack tool with Xerxes
๐ Link : https://github.com/sepehrdaddev/Xerxes
โ๏ธ social fish phishing tool
๐ Link : https://github.com/UndeadSec/SocialFish
โ๏ธ weeman phishing tool no root
๐ Link : https://github.com/evait-security/weeman
โ๏ธ WordPress security scanner Wpseku
๐ Link : https://github.com/m4ll0k/WPSeku
โ๏ธ IDN homograph attack tool
๐ Link : https://github.com/UndeadSec/EvilURL
โ๏ธ Detect security flaws with CMS
๐ Link : https://github.com/Dionach/CMSmap
โ๏ธ Fire crack , admin, finders, deface, bing dorking etc
๐ Link : https://github.com/Ranginang67/Firecrack
โ๏ธ Pish web tool
๐ Link : https://github.com/Cabdulahi/pish
โ๏ธ MITM attack tool
๐ Link : https://github.com/websploit/websploit
โ๏ธ kill shot pentesting framework
๐ Link :https://github.com/bahaabdelwahed/killshot
โ๏ธ WordPress admin finder ๐ Link : https://github.com/kancoq/wpaf
โ๏ธ scannerhttps://github.com/TechnicalMujeeb/smb-scanner
โ๏ธ Heart Bleed scanner
๐ Link : https://github.com/TechnicalMujeeb/HeartBleed
โ๏ธ weevely php web shell
๐ Link : https://github.com/sunge/Weevely
โ๏ธ Webponized web shell
๐ Link : https://github.com/epinna/weevely3
โ๏ธ Nikto web scanner tool
๐ Link : https://github.com/sullo/nikto
โ๏ธ Auto Ip or domain Attacking Tool
๐ Link : https://github.com/Bhai4You/Ip-Attack
https://t.me/TheStarkArmy
โ๏ธ Click jacking vulnerability scanner
๐ Link : https://github.com/D4Vinci/Clickjacking-Tester
โ๏ธ All in 1 information gathering and web penetration tool DTect
๐ Link : https://github.com/Audi0x01/D-TECT-1
โ๏ธ Detect phishing URL
๐ Link : https://github.com/UndeadSec/checkURL
โ๏ธ Dos attack tool - Golden eye
๐ Link : https://github.com/jseidl/GoldenEye
โ๏ธ Dos attack with hulk
๐ Link : https://github.com/grafov/hulk
โ๏ธ Sql vulnerability scanner
๐ Link : https://github.com/Pure-L0G1C/SQL-scanner
https://t.me/TheStarkArmy
โ๏ธ hack website with sqlmap
๐ Link : https://github.com/sqlmapproject/sqlmap
โ๏ธ information and vulnerability scanner with striker
๐ Link : https://github.com/s0md3v/Striker
โ๏ธ web server attacking tool with dost
๐ Link : https://github.com/verluchie/dost-attack
โ๏ธ advanced multithreaded admin panel finder
๐ Link : https://github.com/s0md3v/Breacher
โ๏ธ Ssl vulnerability scanner
๐ Link : https://github.com/PortSwigger/ssl-scanner
โ๏ธ sublister - Subdomain enumeration
๐ Link : https://github.com/aboul3la/Sublist3r
โ๏ธ WordPress vulnerability scanner and attacker
๐ Link : https://github.com/wpscanteam/wpscan
โ๏ธ Hunner scanner framework
๐ Link : https://github.com/b3-v3r/Hunner
โ๏ธ Red hawk all in 1 information gathering and scanning tool
๐ Link : https://github.com/Tuhinshubhra/RED_HAWK
โ๏ธ Dos attack tool with Xerxes
๐ Link : https://github.com/sepehrdaddev/Xerxes
โ๏ธ social fish phishing tool
๐ Link : https://github.com/UndeadSec/SocialFish
โ๏ธ weeman phishing tool no root
๐ Link : https://github.com/evait-security/weeman
โ๏ธ WordPress security scanner Wpseku
๐ Link : https://github.com/m4ll0k/WPSeku
โ๏ธ IDN homograph attack tool
๐ Link : https://github.com/UndeadSec/EvilURL
โ๏ธ Detect security flaws with CMS
๐ Link : https://github.com/Dionach/CMSmap
โ๏ธ Fire crack , admin, finders, deface, bing dorking etc
๐ Link : https://github.com/Ranginang67/Firecrack
โ๏ธ Pish web tool
๐ Link : https://github.com/Cabdulahi/pish
โ๏ธ MITM attack tool
๐ Link : https://github.com/websploit/websploit
โ๏ธ kill shot pentesting framework
๐ Link :https://github.com/bahaabdelwahed/killshot
GitHub
GitHub - TechnicalMujeeb/HeartBleed: using this script you can check your sites is vulnerable or not for heart bleeding vulnerability.
using this script you can check your sites is vulnerable or not for heart bleeding vulnerability. - TechnicalMujeeb/HeartBleed