#artificalintelligence #AI
π¦ AI discovers that every lion has a unique and trackable roar: https://thenextweb.com/neural/2020/10/14/ai-discovers-that-every-lion-has-a-unique-and-trackable-roar/
What an interesting application of AI! π
π¦ AI discovers that every lion has a unique and trackable roar: https://thenextweb.com/neural/2020/10/14/ai-discovers-that-every-lion-has-a-unique-and-trackable-roar/
What an interesting application of AI! π
Neural | The Next Web
AI discovers that every lion has a unique and trackable roar
Oxford University scientists used an algorithm to match recordings of roars to individual lions. The system could help track the animals in the wild.
#COURSE
β‘ Deep Web- The Complete Introduction To The Hidden Web β‘
learn to navigate on the deep web on a daily basis.
Link :- https://www.udemy.com/course/the-complete-introduction-to-the-deep-web/?ranMID=39197&ranEAID=NuZiHLoAApo&ranSiteID=NuZiHLoAApo-j9fQ5JLRVNFJk.dp_Qhqlg&LSNPUBID=NuZiHLoAApo&utm_source=aff-campaign&utm_medium=udemyads&couponCode=D0631B2DD2192A858C14
#share & #supportus
----------------> @geekcode π
Share as more as π
β‘ Deep Web- The Complete Introduction To The Hidden Web β‘
learn to navigate on the deep web on a daily basis.
Link :- https://www.udemy.com/course/the-complete-introduction-to-the-deep-web/?ranMID=39197&ranEAID=NuZiHLoAApo&ranSiteID=NuZiHLoAApo-j9fQ5JLRVNFJk.dp_Qhqlg&LSNPUBID=NuZiHLoAApo&utm_source=aff-campaign&utm_medium=udemyads&couponCode=D0631B2DD2192A858C14
#share & #supportus
----------------> @geekcode π
Share as more as π
#COURSE
Learn Swift 4 : From Beginner to Advanced Swift Free lite
Description: Lite version course
Enroll Now: https://www.udemy.com/course/learn-swift-4-from-beginner-to-advanced-swift-free-lite/
#share & #supportus
-----------------> @geekcode π
Share as more as π
Learn Swift 4 : From Beginner to Advanced Swift Free lite
Description: Lite version course
Enroll Now: https://www.udemy.com/course/learn-swift-4-from-beginner-to-advanced-swift-free-lite/
#share & #supportus
-----------------> @geekcode π
Share as more as π
β‘ HOW HACK FACEBOOK ACCOUNTS USING KEYLOGGER β‘
STEP 1: Create Server for Hacking Passwords
First of all, for hacking any Facebook account password, we have to create our keylogger server that will run on the victimβs machine, capturing his keystrokes and emailing us the record. The keylogger server building process consists of several steps:
1. First of all download the Keylogger and a good binder. Binders are easily available via a Google search.
2. Extract the RAR file. Now you will get one folder and three files.
3. Open the Keylogger file. Here you will need a gmail ID and password. For safer use, create a fake Gmail account.
4. Click on server settings as shown. Here, enter the time at which you want to receive reports; itβs always preferable to use a 20 minute timer for receiving files. Click on the Output box to choose the location of the file and give it a name. We recommend using a system process name to make it undetectable, like svchost, or check any process name from your task manager and name it. Other fields are optional.
5. Click on Log and Result Setting. In Log Email Title enter the subject of email like βmy keylogger reportβ or anything else that you you like. Click the last two options that add computer name and add the victimβs name.
6. Now click on βOther Options.β In this section you just have to do one thing. Most hackers prefer warning message POP up, but I prefer keylogger using any message β so unclick the message button. When you bind it with any other software it should not have a warning message attached, otherwise it will be detectable.
7. Finally click on Build Keylogger. You will see your keylogger file at the location that you have chosen in the 4th step. This keylogger server file will be used to bind with other software in Binding Step.
8. Now your keylogger server is ready for you to hack Facebook accounts.
Step 2: Extracting the icon file from any installer (resource hacker)
1. Open the resource hacker folder and select the reshacker file.
2. Go to its menu and open any setup file. Suppose we want to attach our keylogger to a Ccleaner setup file. Open the Ccleaner setup with resource hacker.
3. In the menu, there is one action button. Click on it and then click save all resource.
4. Save all the resources to the desktop or any other location of your choice.
5. It consists of two files. One is icon file and other is res file. We only need the icon file, so you can delete the other one.
6. That leaves us with the icon of installer file (Ccleaner setup icon).
Step 3: Bind the Keylogger server with any software
1. Go to keylogger folder and open the Binder.
2. Click on the button shown below to add files.
3. Add the keylogger server and the setup software (in our case itβs Ccleaner setup).
4. In the Binder menu, go to Settings. There, select the icon that we have generated in the previous step and set the location of the output file as shown in the figure.
5. Now again go to fileβs menu in Binder and click on Bind files.
6. Now your Binded keylogger is ready. You just need to spread it or send it to the victim that is your friend.
Step 4: How to spread the keylogger
1. Now you have one software setup file with a keylogger attached to it. (In our case, we have Ccleaner setup with keylogger attached with it)
2. Spread your keylogger through forums. If you are a member of various forums, use them to spread your keylogger in the form of software posts.
3. Spread it through pendrives or USB hard drives. Suppose a friend asked you for a software, give them the software with the keylogger attached to it on the hard drive.
Note: you can also attach keyloggers to images, but that can be detectable by antivirus, so we recommend avoiding that route.
Hacking someoneβs Facebook account takes more than a few minutes.
Share and Pin our Channel at top πβ€οΈ
-----------------> @geekcode π
STEP 1: Create Server for Hacking Passwords
First of all, for hacking any Facebook account password, we have to create our keylogger server that will run on the victimβs machine, capturing his keystrokes and emailing us the record. The keylogger server building process consists of several steps:
1. First of all download the Keylogger and a good binder. Binders are easily available via a Google search.
2. Extract the RAR file. Now you will get one folder and three files.
3. Open the Keylogger file. Here you will need a gmail ID and password. For safer use, create a fake Gmail account.
4. Click on server settings as shown. Here, enter the time at which you want to receive reports; itβs always preferable to use a 20 minute timer for receiving files. Click on the Output box to choose the location of the file and give it a name. We recommend using a system process name to make it undetectable, like svchost, or check any process name from your task manager and name it. Other fields are optional.
5. Click on Log and Result Setting. In Log Email Title enter the subject of email like βmy keylogger reportβ or anything else that you you like. Click the last two options that add computer name and add the victimβs name.
6. Now click on βOther Options.β In this section you just have to do one thing. Most hackers prefer warning message POP up, but I prefer keylogger using any message β so unclick the message button. When you bind it with any other software it should not have a warning message attached, otherwise it will be detectable.
7. Finally click on Build Keylogger. You will see your keylogger file at the location that you have chosen in the 4th step. This keylogger server file will be used to bind with other software in Binding Step.
8. Now your keylogger server is ready for you to hack Facebook accounts.
Step 2: Extracting the icon file from any installer (resource hacker)
1. Open the resource hacker folder and select the reshacker file.
2. Go to its menu and open any setup file. Suppose we want to attach our keylogger to a Ccleaner setup file. Open the Ccleaner setup with resource hacker.
3. In the menu, there is one action button. Click on it and then click save all resource.
4. Save all the resources to the desktop or any other location of your choice.
5. It consists of two files. One is icon file and other is res file. We only need the icon file, so you can delete the other one.
6. That leaves us with the icon of installer file (Ccleaner setup icon).
Step 3: Bind the Keylogger server with any software
1. Go to keylogger folder and open the Binder.
2. Click on the button shown below to add files.
3. Add the keylogger server and the setup software (in our case itβs Ccleaner setup).
4. In the Binder menu, go to Settings. There, select the icon that we have generated in the previous step and set the location of the output file as shown in the figure.
5. Now again go to fileβs menu in Binder and click on Bind files.
6. Now your Binded keylogger is ready. You just need to spread it or send it to the victim that is your friend.
Step 4: How to spread the keylogger
1. Now you have one software setup file with a keylogger attached to it. (In our case, we have Ccleaner setup with keylogger attached with it)
2. Spread your keylogger through forums. If you are a member of various forums, use them to spread your keylogger in the form of software posts.
3. Spread it through pendrives or USB hard drives. Suppose a friend asked you for a software, give them the software with the keylogger attached to it on the hard drive.
Note: you can also attach keyloggers to images, but that can be detectable by antivirus, so we recommend avoiding that route.
Hacking someoneβs Facebook account takes more than a few minutes.
Share and Pin our Channel at top πβ€οΈ
-----------------> @geekcode π
π Types Of Digital Footprints π³
βββββββββββββ
Digital footprints can be classified into two broad categories β active and passive footprints β which depends on how your information is acquired.
π£ Active Digital Footprints π£
βββββββββββββ
Active digital footprints consist of the data you leave when you make deliberate choices on the internet. For instance, posts you make to your social media channels are a form of active footprint. When you are logged into a project management or similar site, changes you make that are connected to your login name are also part of your active footprint.
Here are a few examples of active digital footprints.
π΅Posting on Facebook, Instagram, Snapchat, Twitter, and other social media platforms.
π΅Filling out online forms, such as when signing up to receive emails or texts.
π΅Agreeing to install cookies on your devices when prompted by the browser.
π£ Passive Digital Footprints π£
βββββββββββββ
Passive digital footprints are those you leave behind without intending to or, in some cases, without knowing it.
For instance, websites that collect information about how many times youβve visited recently are adding to your digital footprint in a passive fashion. Thatβs because you donβt choose to give them this data. They collect it when a device at your IP address connects with their website. This is a hidden process, and you may not realize it is happening at all.
Here are three examples of passive digital footprints.
π΅Websites that install cookies in your device without disclosing it to you.
π΅Apps and websites that use geolocation to pinpoint your location.
π΅Social media news channels and advertisers that use your likes, shares, and comments to profile you and to serve up advertisements based on your interests.
Both active and passive footprints can be tracked and observed in multiple ways and by multiple sources.
βββββββββββββ
--------------------> @geekcode π
βββββββββββββ
Digital footprints can be classified into two broad categories β active and passive footprints β which depends on how your information is acquired.
π£ Active Digital Footprints π£
βββββββββββββ
Active digital footprints consist of the data you leave when you make deliberate choices on the internet. For instance, posts you make to your social media channels are a form of active footprint. When you are logged into a project management or similar site, changes you make that are connected to your login name are also part of your active footprint.
Here are a few examples of active digital footprints.
π΅Posting on Facebook, Instagram, Snapchat, Twitter, and other social media platforms.
π΅Filling out online forms, such as when signing up to receive emails or texts.
π΅Agreeing to install cookies on your devices when prompted by the browser.
π£ Passive Digital Footprints π£
βββββββββββββ
Passive digital footprints are those you leave behind without intending to or, in some cases, without knowing it.
For instance, websites that collect information about how many times youβve visited recently are adding to your digital footprint in a passive fashion. Thatβs because you donβt choose to give them this data. They collect it when a device at your IP address connects with their website. This is a hidden process, and you may not realize it is happening at all.
Here are three examples of passive digital footprints.
π΅Websites that install cookies in your device without disclosing it to you.
π΅Apps and websites that use geolocation to pinpoint your location.
π΅Social media news channels and advertisers that use your likes, shares, and comments to profile you and to serve up advertisements based on your interests.
Both active and passive footprints can be tracked and observed in multiple ways and by multiple sources.
βββββββββββββ
--------------------> @geekcode π
GeekCode pinned Β«π Types Of Digital Footprints π³ βββββββββββββ Digital footprints can be classified into two broad categories β active and passive footprints β which depends on how your information is acquired. π£ Active Digital Footprints π£ βββββββββββββ Active digital footprintsβ¦Β»
#COURSE
Introduction to Python: Python for Beginners
This course is a great introduction to both fundamental python programming concepts and the Python programming language.
Getting Started,Values and Data Types, Operators and Operands, Function Calls
Write scripts for general productivity tasks Read and comprehend Python code Gain knowledge in regard to general programming concepts
Enroll now -:
https://www.udemy.com/course/python-crash-course-for-beginners-l/?couponCode=7869C46CCA67F5D0A55D
Dont forget to share our channel
--------------------> @geekcodeπ
Share as more as π
Introduction to Python: Python for Beginners
This course is a great introduction to both fundamental python programming concepts and the Python programming language.
Getting Started,Values and Data Types, Operators and Operands, Function Calls
Write scripts for general productivity tasks Read and comprehend Python code Gain knowledge in regard to general programming concepts
Enroll now -:
https://www.udemy.com/course/python-crash-course-for-beginners-l/?couponCode=7869C46CCA67F5D0A55D
Dont forget to share our channel
--------------------> @geekcodeπ
Share as more as π
https://codeagents.blogspot.com/2020/10/where-to-learn-programming-language.html?m=1
--------------------> @geekcode
Share as more as π
--------------------> @geekcode
Share as more as π
Blogspot
Where to learn programming language ?
Hacking Android Apps with Frida
https://youtu.be/iMNs8YAy6pk
--------------------> @geekcode π
Share as more as π
https://youtu.be/iMNs8YAy6pk
--------------------> @geekcode π
Share as more as π
YouTube
Hacking Android Apps with Frida
Recording from Meta's security conference 2020 - Enjoy
β‘[Udemy] Hacking in Practice Certified Ethical Hacking Course β‘
βοΈDownload:
https://drive.google.com/drive/folders/1-kWcfPYzxzGFc4eLSfms_4dORl7sqh-t?usp=sharing
β»οΈSize:- 2 GB
#share & #supportus
--------------> @geekcode π
Share as more as π
βοΈDownload:
https://drive.google.com/drive/folders/1-kWcfPYzxzGFc4eLSfms_4dORl7sqh-t?usp=sharing
β»οΈSize:- 2 GB
#share & #supportus
--------------> @geekcode π
Share as more as π
β‘ How Hackers Create Undetectable Malware and Viruses β οΈ
β‘
π Author :- Nikhil Parekh
Requirements :-
πΈ Open Mind and Willingness to Implement
πΉ Notebook or Journal to Take Lots of Notes
Course Content :-
πΉ Understand What Undetectable Malware is
πΈ Learn How to Install Python and Pip
πΉ Install the Veil Framework
πΈ Understand the Gnome Desktop
πΉ Install Wine Mono
πΈ Learn How to Install Metasploit
πΉ Test the MSF Console
πΈ Create an Exploit with Veil
πΉ Test the Exploit on a Windows 10 Machine
πΈ How to Encrypt the Payload to Avoid Detection
πΉ Discover How Hackers Take Control of Webcams, Modify Documents and Much More
Source Link :-
https://www.udemy.com/course/undetectable-malware/
Download Link :-
https://mega.nz/folder/Ug9RFK5Z#nrZTlXMaJippG34v3g-fqA
Share and Pin our Channel at top πβ€οΈ
β‘
π Author :- Nikhil Parekh
Requirements :-
πΈ Open Mind and Willingness to Implement
πΉ Notebook or Journal to Take Lots of Notes
Course Content :-
πΉ Understand What Undetectable Malware is
πΈ Learn How to Install Python and Pip
πΉ Install the Veil Framework
πΈ Understand the Gnome Desktop
πΉ Install Wine Mono
πΈ Learn How to Install Metasploit
πΉ Test the MSF Console
πΈ Create an Exploit with Veil
πΉ Test the Exploit on a Windows 10 Machine
πΈ How to Encrypt the Payload to Avoid Detection
πΉ Discover How Hackers Take Control of Webcams, Modify Documents and Much More
Source Link :-
https://www.udemy.com/course/undetectable-malware/
Download Link :-
https://mega.nz/folder/Ug9RFK5Z#nrZTlXMaJippG34v3g-fqA
Share and Pin our Channel at top πβ€οΈ
POPULAR MOBILE BROWSERS FOUND VULNERABLE AT BAR SPOOOFING VULNERABILITY
https://thehackernews.com/2020/10/browser-address-spoofing-vulnerability.html
-------------> @geekcode π
Share as more as π
https://thehackernews.com/2020/10/browser-address-spoofing-vulnerability.html
-------------> @geekcode π
Share as more as π
π° Practical Ethical Hacking - The Complete Course π°
https://academy.tcm-sec.com/p/practical-ethical-hacking-the-complete-course
Use Coupon: FREELEARN
#share & #supportus
--------------> @geekcode π
Share as more as π
https://academy.tcm-sec.com/p/practical-ethical-hacking-the-complete-course
Use Coupon: FREELEARN
#share & #supportus
--------------> @geekcode π
Share as more as π
Forwarded from Bug Bounty π
Multiple Address Bar Spoofing Vulnerabilities In Mobile Browsers (Safari, Yandex for Android, Opera Touch for iOS, UC Browser for Android, Opera Mini Android, RITS Browser and Bolt Browser iOS)
https://www.rafaybaloch.com/2020/10/multiple-address-bar-spoofing-vulnerabilities.html
@bugbountyy
https://www.rafaybaloch.com/2020/10/multiple-address-bar-spoofing-vulnerabilities.html
@bugbountyy
Miscellaneous Ramblings of a Cyber Security Researcher
Multiple Address Bar Spoofing Vulnerabilities In Mobile Browsers
Explore expert insights on pentesting/bug bounty hunting on this blog, your go-to resource for cutting-edge web security research.
Business Analytics Course 2020
Learn the Core of Data Science, Analytical Skill and Business Knowledge to make confident decisions.
Enroll Now - > https://geekcode.com/love-u-guys
#share & #supportus
----------------> @geekcode π
Share as more as π
Learn the Core of Data Science, Analytical Skill and Business Knowledge to make confident decisions.
Enroll Now - > https://geekcode.com/love-u-guys
#share & #supportus
----------------> @geekcode π
Share as more as π