FROM INTERNET
1)How I was able to spoof any Instagram username on Instagram shop
https://medium.com/@nvmeeet/how-i-was-able-to-spoof-any-instagram-username-on-instagram-shop-b4d6abdb474a
2)Using Recon-Ng for Recon for Bug Bounty
https://medium.com/@jowin.sathianesan/using-recon-ng-for-recon-for-bug-bounty-78f9d32e795
3)Why we use Nmap?
https://medium.com/@mukundkumarjha2005/why-we-use-nmap-7cc34ab3a2a6
4)Menyelesaikan Challenge CTF #2 dan Mendapatkan IDR 10.000K
https://medium.com/@agussetyar/menyelesaikan-challenge-ctf-2-dan-mendapatkan-idr-10-000k-32b5b1eef23d
5)Implementing Django-rest API Throttling and Unauthenticated bypass
https://infosecwriteups.com/implementing-django-rest-api-throttling-and-unauthenticated-bypass-dda550b07443
6)Efficient Linux at the Command Line eBook Free Download
https://reconshell.com/efficient-linux-at-the-command-line-ebook-free-download/
1)How I was able to spoof any Instagram username on Instagram shop
https://medium.com/@nvmeeet/how-i-was-able-to-spoof-any-instagram-username-on-instagram-shop-b4d6abdb474a
2)Using Recon-Ng for Recon for Bug Bounty
https://medium.com/@jowin.sathianesan/using-recon-ng-for-recon-for-bug-bounty-78f9d32e795
3)Why we use Nmap?
https://medium.com/@mukundkumarjha2005/why-we-use-nmap-7cc34ab3a2a6
4)Menyelesaikan Challenge CTF #2 dan Mendapatkan IDR 10.000K
https://medium.com/@agussetyar/menyelesaikan-challenge-ctf-2-dan-mendapatkan-idr-10-000k-32b5b1eef23d
5)Implementing Django-rest API Throttling and Unauthenticated bypass
https://infosecwriteups.com/implementing-django-rest-api-throttling-and-unauthenticated-bypass-dda550b07443
6)Efficient Linux at the Command Line eBook Free Download
https://reconshell.com/efficient-linux-at-the-command-line-ebook-free-download/
Medium
How I was able to spoof any Instagram username on Instagram shop
Summary: i discovered that i can spoof any Instagram username on Instagram shop, with this bug scammers can trick people into thinking they…
A selection of OSINT search engines
Clearnet
1. search.carrot2.org - cluster search engine, identifies objects or categories associated with a word in a search query
2. boardreader.com - search engine for forums
3. searchcode.com - search by code in open repositories
4. swisscows.com - semantic search engine
5. intelx.io - Find by email addresses, domains, URLs, IPs, CIDRs, bitcoin addresses, IPFS hashes, etc.
6. publicwww.com - search in the source code of pages, you can search for nicknames, mails, trackers, wallets, website addresses, etc.
7. psbdmp.ws - search in pastebin texts
8. kribrum.io - search on social networks
9. recon.secapps.com - automatic search and creation of relationship maps
10. leph.occrp.org - search databases, files, company registers, leaks, and other sources
11.opendirectory-finder - google search with dorks
Tor
1. FreshOnions
2. DarkSearch
3.onionsearchengine.com
Clearnet
1. search.carrot2.org - cluster search engine, identifies objects or categories associated with a word in a search query
2. boardreader.com - search engine for forums
3. searchcode.com - search by code in open repositories
4. swisscows.com - semantic search engine
5. intelx.io - Find by email addresses, domains, URLs, IPs, CIDRs, bitcoin addresses, IPFS hashes, etc.
6. publicwww.com - search in the source code of pages, you can search for nicknames, mails, trackers, wallets, website addresses, etc.
7. psbdmp.ws - search in pastebin texts
8. kribrum.io - search on social networks
9. recon.secapps.com - automatic search and creation of relationship maps
10. leph.occrp.org - search databases, files, company registers, leaks, and other sources
11.opendirectory-finder - google search with dorks
Tor
1. FreshOnions
2. DarkSearch
3.onionsearchengine.com
workingsubdomains.txt
135.5 KB
salesforce.com
Working subdomain list
https://www.salesforce.com/company/disclosure/
❤️❤️ Enjoy and Share ❤️❤️
Support Us ❤️
Channel : @freelearningtech
Group : @freelearningtech21
Website : https://freelearningtech.in/
Working subdomain list
https://www.salesforce.com/company/disclosure/
❤️❤️ Enjoy and Share ❤️❤️
Support Us ❤️
Channel : @freelearningtech
Group : @freelearningtech21
Website : https://freelearningtech.in/
👍1
Freelearningtech pinned «https://youtu.be/RYVMjsAnHOs *New video* *Don't forget to subscribe*»
https://youtube.com/channel/UCnoCvpNUAbU2L60GzhElP0Q
I will put a complete Networking , complete ceh v 11 module , complete wordpress complete seo in one video you must subscribe this channel i will upload a long videos in this channel
I will put a complete Networking , complete ceh v 11 module , complete wordpress complete seo in one video you must subscribe this channel i will upload a long videos in this channel
Freelearningtech pinned «https://youtube.com/channel/UCnoCvpNUAbU2L60GzhElP0Q I will put a complete Networking , complete ceh v 11 module , complete wordpress complete seo in one video you must subscribe this channel i will upload a long videos in this channel»
FROM INTERNET
1)Admin Login Bypass in a Coaching system
https://a-rshukla.medium.com/admin-login-bypass-in-a-coaching-system-adc8a18ea197
2)P1 Vulnerability: How I chained Logical-Error to Account-Takeover Vulnerability 😈🧑💻that No-One said you before😁
https://gowtham-naidu.medium.com/p1-vulnerability-how-i-chained-logical-error-to-account-takeover-vulnerability-that-no-one-59aa88a9cae8
3)Do you have these dangerous HTTP methods enabled on your server?
https://thexssrat.medium.com/do-you-have-these-dangerous-http-methods-enabled-on-your-server-4646b26e9392
4)My Pentest Log -1 -
https://hcibo.medium.com/my-pentest-log-1-1bd47e9998bd
5)Bug Bounty Methodology - Web Vulnerabilities Checklist
https://aaryanapex.medium.com/bug-bounty-methodology-web-vulnerabilities-checklist-86175dd29987
6)IDOR — TryHackme
https://mukibas37.medium.com/idor-tryhackme-92823b28b1d
7)Carriage Return Line Feed (CRLF)| CRLF INJECTION | HTTP Response Splitting
https://www.hackbyte.org/crlf-injection-and-http-response-splitting/
8)Cookie Files: Associated Privacy and Security Risk Overview
https://latesthackingnews.com/2022/01/11/cookie-files-associated-privacy-and-security-risk-overview/
9)OWASP DevSecOps Guideline
https://reconshell.com/owasp-devsecops-guideline/
10)SpoofThatMail
Bash script to check if a domain or list of domains can be spoofed based in DMARC records
https://github.com/v4d1/SpoofThatMail
1)Admin Login Bypass in a Coaching system
https://a-rshukla.medium.com/admin-login-bypass-in-a-coaching-system-adc8a18ea197
2)P1 Vulnerability: How I chained Logical-Error to Account-Takeover Vulnerability 😈🧑💻that No-One said you before😁
https://gowtham-naidu.medium.com/p1-vulnerability-how-i-chained-logical-error-to-account-takeover-vulnerability-that-no-one-59aa88a9cae8
3)Do you have these dangerous HTTP methods enabled on your server?
https://thexssrat.medium.com/do-you-have-these-dangerous-http-methods-enabled-on-your-server-4646b26e9392
4)My Pentest Log -1 -
https://hcibo.medium.com/my-pentest-log-1-1bd47e9998bd
5)Bug Bounty Methodology - Web Vulnerabilities Checklist
https://aaryanapex.medium.com/bug-bounty-methodology-web-vulnerabilities-checklist-86175dd29987
6)IDOR — TryHackme
https://mukibas37.medium.com/idor-tryhackme-92823b28b1d
7)Carriage Return Line Feed (CRLF)| CRLF INJECTION | HTTP Response Splitting
https://www.hackbyte.org/crlf-injection-and-http-response-splitting/
8)Cookie Files: Associated Privacy and Security Risk Overview
https://latesthackingnews.com/2022/01/11/cookie-files-associated-privacy-and-security-risk-overview/
9)OWASP DevSecOps Guideline
https://reconshell.com/owasp-devsecops-guideline/
10)SpoofThatMail
Bash script to check if a domain or list of domains can be spoofed based in DMARC records
https://github.com/v4d1/SpoofThatMail
Medium
Admin Login Bypass in a Coaching system
Hello readers I am Aditya , Recently hunting around in a coaching site I found a critical bug at…
Roblox Information Gathering — RoLookup
I decided to make my own lookup tool am done with the first version and it has following features :
▪️User Information (User ID, Display Name, Bio, Is User Online, Profile URL, Creation Date, Roblox Badges, User Badges)
▪️Friends count and save names
▪️Follower count and save name
▪️Warn and save banned/deleted accounts
▪️Fetch count of user and roblox badges and save the names into several text files
▪️Username registration check
▪️Avatar Downloader
Some other features :
▪️Make folder with user information
▪️Clean all existing folders
What the next version will have :
▪️Inventory information
▪️Creations information
▪️Last rooms played
▪️Single Lookups (username check, badge check etc.)
💨 Usage :
Run script without arguments with manual input username:
python3 rolookup.py
Clean all downloaded data folders of users :
python3 rolookup.py -c
Get infos of username
python3 rolookup.py -u kevin01
🔗 Link :
https://git.it-kuny.ch/viperzcrew/rolookup
I decided to make my own lookup tool am done with the first version and it has following features :
▪️User Information (User ID, Display Name, Bio, Is User Online, Profile URL, Creation Date, Roblox Badges, User Badges)
▪️Friends count and save names
▪️Follower count and save name
▪️Warn and save banned/deleted accounts
▪️Fetch count of user and roblox badges and save the names into several text files
▪️Username registration check
▪️Avatar Downloader
Some other features :
▪️Make folder with user information
▪️Clean all existing folders
What the next version will have :
▪️Inventory information
▪️Creations information
▪️Last rooms played
▪️Single Lookups (username check, badge check etc.)
💨 Usage :
Run script without arguments with manual input username:
python3 rolookup.py
Clean all downloaded data folders of users :
python3 rolookup.py -c
Get infos of username
python3 rolookup.py -u kevin01
🔗 Link :
https://git.it-kuny.ch/viperzcrew/rolookup
https://youtu.be/V7uKajt7Z1A
If you want to earn money from blogging then see this video
Approx one hour complete video for Website creation
How to earn money from blogging
How to create a website for earn money
You must subscribe this channel
Support Us ❤️
Channel : @freelearningtech
Group : @freelearningtech21
Website : https://freelearningtech.in/
If you want to earn money from blogging then see this video
Approx one hour complete video for Website creation
How to earn money from blogging
How to create a website for earn money
You must subscribe this channel
Support Us ❤️
Channel : @freelearningtech
Group : @freelearningtech21
Website : https://freelearningtech.in/
Freelearningtech pinned «https://youtu.be/V7uKajt7Z1A If you want to earn money from blogging then see this video Approx one hour complete video for Website creation How to earn money from blogging How to create a website for earn money You must subscribe this channel Support…»
Forwarded from 🇮🇳 ANON SECURITY SOLUTIONS 🇮🇳 (☠️🇮🇳 ༄ᴹᴿ°᭄ANON࿐ 🇮🇳☠️)
Please open Telegram to view this post
VIEW IN TELEGRAM
https://youtu.be/Rgd3v5fLjW4
*small video time 3 minutes*
*Must watch this video for understanding importance of information gathering*
*Subscribe this channel and press the bell icon for getting notification*
*small video time 3 minutes*
*Must watch this video for understanding importance of information gathering*
*Subscribe this channel and press the bell icon for getting notification*
Freelearningtech pinned «https://youtu.be/Rgd3v5fLjW4 *small video time 3 minutes* *Must watch this video for understanding importance of information gathering* *Subscribe this channel and press the bell icon for getting notification*»
https://youtu.be/mY9tIBiySS4
*How to create a website in blogger in free*
*Subscribe our channel and press the bell icon*
*Next video is How to do Seo on blogger manually*
*How to create a website in blogger in free*
*Subscribe our channel and press the bell icon*
*Next video is How to do Seo on blogger manually*
Freelearningtech pinned «https://youtu.be/mY9tIBiySS4 *How to create a website in blogger in free* *Subscribe our channel and press the bell icon* *Next video is How to do Seo on blogger manually*»
Forwarded from 👊 M4nifest0 (M4) ™[Priv8 Tools] ( )
Media is too big
VIEW IN TELEGRAM
The FSB publishes a video of one of the special operations to neutralize the REvil hacker group.
The special service stated that it had established the full composition of REvil and the involvement of its members in the illegal circulation of means of payment, the detained members of the group were charged under article 187 of the Russian criminal code.
Over 426 million rubles were seized at 25 addresses, including in cryptocurrency, 600 thousand dollars, 500 thousand euros, as well as computer equipment, crypto wallets and 20 premium cars bought with criminal money.
The special service stated that it had established the full composition of REvil and the involvement of its members in the illegal circulation of means of payment, the detained members of the group were charged under article 187 of the Russian criminal code.
Over 426 million rubles were seized at 25 addresses, including in cryptocurrency, 600 thousand dollars, 500 thousand euros, as well as computer equipment, crypto wallets and 20 premium cars bought with criminal money.
🔰Network Protocol Terminologies Part 2🔰
🌀Router: A router is a network device whose main goal is to transfer data back and forth between different networks. This device allows requests to be made to the internet and for information to be sent back to the devices on a local network.
🌀Switch: The basic function of a switch is to provide access between devices on a local network. An example is an Ethernet switch.
🌀Network Interface: This component allows you to connect to a public or private network. It provides the software required to utilize networking hardware. An example of this is the Network Interface Cards (NICs).
🌀Port: A port is a logically defined connection location. Ports provide a destination endpoint for communication and the transfer of data. The ports range from 0 to 65535.
🌀Packet: A packet is the basic unit of data transferred over a network. A packet has a header that gives information about the packet (source, destination, etc) and a body or payload containing the actual data being sent.
Share And Support Us ♥️
🌀Router: A router is a network device whose main goal is to transfer data back and forth between different networks. This device allows requests to be made to the internet and for information to be sent back to the devices on a local network.
🌀Switch: The basic function of a switch is to provide access between devices on a local network. An example is an Ethernet switch.
🌀Network Interface: This component allows you to connect to a public or private network. It provides the software required to utilize networking hardware. An example of this is the Network Interface Cards (NICs).
🌀Port: A port is a logically defined connection location. Ports provide a destination endpoint for communication and the transfer of data. The ports range from 0 to 65535.
🌀Packet: A packet is the basic unit of data transferred over a network. A packet has a header that gives information about the packet (source, destination, etc) and a body or payload containing the actual data being sent.
Share And Support Us ♥️