GeekCode
794 subscribers
452 photos
3 videos
7 files
942 links
🍁Cyber Security ❀️
🍁Hacking Resources πŸ‘¨β€πŸ’»

Providing knowledge to people'sπŸ₯€
Nobody gets smaller by sharing knowledge
You can also share your knowledge with us...πŸ™‚πŸ™‚

πŸ“°Promotion/Query - @geekcodevipbot
Download Telegram
Google Sheets: Pivot Tables + Data Insights For Beginners!

Description: Learn to explore data & uncover insights with Google Sheets pivot tables! Course taught by fmr Google Analytical Lead.

Enroll Now:
https://www.udemy.com/course/google-sheets-pivot-tables-plus-data-insights-for-beginners/

#share & #supportus

------------------->
@geekcode πŸ“

Share as more as 😍
Forwarded from GeekCode
⚑We receive information about the victim by gmail mail ⚑

I want to tell you about a very cool osynt tool for collecting information from mail.

This is the data you will receive with only mail:

- Owner's name
- Date of last edit
- Google id
- Activated Google services (
- Possible YouTube channel
- Possible names
- Public photos
- Phone models
- Firmware phones
- Installed software
- Reviews about Google Maps
- Possible physical location

Installation takes place in the terminal
To do this, we enter into Termux one by one:

apt update

apt upgrade

apt install git python

git clone https://github.com/mxrch/GHunt

pip3 install -r requirements.txt

python check_and_gen.py

And like this, we start the search by mail:

python hunt.py example@gmail.com
Forwarded from GeekCode
⚑How To Make Azure RDP For 1 Hour | Repeatable You Can Create Unlimited RDPs ⚑

But it is not easy For Everyone So I found one method by which you can Create Unlimited Azure RDP With any specs Only Problem is :

This RDP only work for 1 Hours. But it is Repeatable So You Can Create New RDP Every Hour.

It is Working I just tested now.

Method:

1. Open New Incognito Window in Chrome.

2. Open This Link :
https://docs.microsoft.com/en-us/learn/modules/create-windows-virtual-machine-in-azure/

3. Click on Blue "Start" Button.

4. Scroll Down and Click Blue "Continue" till You Reach on Unit 3 of 7.

5. Click on White "Sign in to activate sandbox" Button. It will Redirect You to Microsoft Page.

6. Click on "Create One!" Button

7. Now You have 2 Options Whether You Choose to Sign up through outlook or Hotmail or You Can Use Temp Mail From
Tempm.com

8. Fill All necessary Details, Solve Puzzle and Make New Account.

9. Wait 1-2 Second Than Click on Next Button and Choose any Display Name & Country.

10. Select "Student" In Roles and "Beginner" in Level and "Azure" in Products and click ok.

11. Now Scroll and Click Continue till you reach Unit 5 of 7.

12. Now scroll Little bit and find and Click on Azure Portal written in blue under "Download the RDP file" Heading.

13. It will open new tab. Now sign in with Same Account Here and than click on subscription button on azure portal.

14. As You can see there is not any active subscription. So go back to fast tab and scroll up and click on White "Activate Sandbox" Button.

15. Now wait for some loading than scroll down and click on continue till you finish topic and than go back to 2nd tab and reload You will Get Subscription For 1 Hour Now You can Create RDP with This Method.

P.S It shows sometime error that Sandbox Suspended Because of unusual activity. No Worry just change IP or wait for 1-2 hours It will Work again. (You can also make new RDP on old RDP It will save you from suspension )

#share & #supportus

------------------->
@geekcode πŸ“

Share as more as 😍
✳️ How to Recover Data From Corrupted OS
βž–βž–βž–βž–βž–βž–βž–βž–βž–βž–βž–βž–βž–
⚜ We are going to use EaseUS data recovery to recover data from a crashed operating system. The software is mainly designed for data recovery cases of any operating system crash.

πŸ”ΉStep 1: First of all, launch EaseUS data recovery on a working computer. Select β€˜USB Drive’ from the list and click on β€˜Proceed’. Wait for few minutes until EaseUS data recovery creates a WinPE bootable disk.

πŸ”ΉStep 2: Once done, connect the bootable disk to the PC with the corrupted Windows system files. Restart the PC and press F2 during the start. This will run the EaseUS data recovery on the startup.

πŸ”ΉStep 3: Now it will show you the disk partitions. Select the disk where you want to recover data and then click on the β€˜Scan’ button.

πŸ”ΉStep 4: Now, wait for a few minutes until the tool scans for the available data. Once done, it will list all file types that can be recovered.

πŸ”ΉStep 5: You can either choose to preview or click on the β€˜Recover’ button to save the file. Make sure to choose a different drive or different USB to save the file.

βœ… That’s it, you are done! This is how you can use EaseUS data recovery to recover data from a Crashed operating system.

@geekcode πŸ“
#COURSE
Introduction to Python: Python for Beginners
This course is a great introduction to both fundamental python programming concepts and the Python programming language.

Getting Started,Values and Data Types, Operators and Operands, Function Calls
Write scripts for general productivity tasks Read and comprehend Python code Gain knowledge in regard to general programming concepts

Enroll Here -:

https://www.udemy.com/course/python-crash-course-for-beginners-l/?couponCode=6A6D2FDF808EC9C92928

#share & #supportus

-------------------> @geekcode πŸ“

Share as more as 😍
πŸ”° [Udemy] The RedTeam Blueprint - A Unique Guide To Ethical Hacking πŸ”°

Download Link:- https://mega.nz/folder/jckyXaaL#ro5gEgVSjsfDkUq5oAvmUA

⭕️Size: 20 GB

#share & #supportus

---------------> @geekcode πŸ“

Share as more as 😍
Awesome key-board shortcuts for data scientists! πŸ€“πŸ‘‡πŸΌ

https://www.linkedin.com/posts/mlindia_keyboard-shortcuts-for-data-scientist-activity-6716221331727290368-tRjf

#share & #supportus

-------------> @geekcode πŸ“

Share as more as 😍
CYBER SECURITY EVENT 😍
Virtual Cybersecurity Event Hosted by Devolutions  Yahoo Finance
https://finance.yahoo.com/news/virtual-cybersecurity-event-hosted-devolutions-150000750.html

#share & #supportus

----------------->
@geekcode πŸ“

Share as more as 😍
It’s bad enough that many ransomware gangs now have blogs where they publish data stolen from companies that refuse to make an extortion payment. Now, one crime group has started using hacked Facebook accounts to run ads publicly pressuring their ransomware victims into paying up.MediaOn the evening of Monday, Nov. 9, an ad campaign apparently taken out by the Ragnar Locker Team began appearing on Facebook. The ad was designed to turn the screws to the Italian beverage vendor Campari Group, which acknowledged on Nov. 3 that its computer systems had been sidelined by a malware attack.On Nov. 6, Campari issued a follow-up statement saying β€œat this stage, we cannot completely exclude that some personal and business data has been taken.β€β€œThis is ridiculous and looks like a big fat lie,” reads the Facebook ad campaign from the Ragnar crime group. β€œWe can confirm that confidential data was stolen and we talking about huge volume of data.”The ad went on to say Ragnar Locker Team had offloaded two terabytes of information and would give the Italian firm until 6 p.m. EST today (Nov. 10) to negotiate an extortion payment in exchange for a promise not to publish the stolen files.The Facebook ad blitz was paid for by Hodson Event Entertainment, an account tied to Chris Hodson, a deejay based in Chicago. Contacted by KrebsOnSecurity, Hodson said his Facebook account indeed was hacked, and that the attackers had budgeted $500 for the entire campaign.β€œI thought I had two-step verification turned on for all my accounts, but now it looks like the only one I didn’t have it set for was Facebook,” Hodson said.Hodson said a review of his account shows the unauthorized campaign reached approximately 7,150 Facebook users, and generated 770 clicks, with a cost-per-result of 21 cents. Of course, it didn’t cost the ransomware group anything. Hodson said Facebook billed him $35 for the first part of the campaign, but apparently detected the ads as fraudulent sometime this morning before his account could be billed another $159 for the campaign.MediaThe results of the unauthorized Facebook ad campaign. Image: Chris Hodson.It’s not clear whether this was an isolated incident, or whether the fraudsters also ran ads using other hacked Facebook accounts. A spokesperson for Facebook said the company is still investigating the incident. A request for comment sent via email to Campari’s media relations team was returned as undeliverable.But it seems likely we will continue to see more of this and other mainstream advertising efforts by ransomware groups going forward, even if victims really have no expectation that paying an extortion demand will result in criminals actually deleting or not otherwise using stolen data.Fabian Wosar, chief technology officer at computer security firm Emsisoft, said some ransomware groups have become especially aggressive of late in pressuring their victims to pay up.β€œThey have also started to call victims,” Wosar said. β€œThey’re outsourcing to Indian call centers, who call victims asking when they are going to pay or have their data leaked.”
https://krebsonsecurity.com/2020/11/ransomware-group-turns-to-facebook-ads/

#share & #supportus

-----------------> @geekcode πŸ“

Share as more as 😍
#COURSE
Learn Python Programming From A-Z: Beginner To Expert Course.

Enroll here-:

https://geekcode.com/python-AtoZ

#share & #supportus

------------------>
@geekcode πŸ“

Share as more as 😍
πŸ”° [Udemy] Linux Privilege Escalation for Beginners πŸ”°

Download Link πŸ”—-:https://mega.nz/folder/kllSCJaB#URQm1GHIopziyxn2Wg2caw

⭕️Size: 2.6 GB

#share & #supportus

------------------> @geekcode πŸ“

Share as more as 😍
This media is not supported in your browser
VIEW IN TELEGRAM
β€‹β€‹πŸ”° 30+ READYMADE PHISHING PAGES FOR HACKING, SPAMMINGπŸ”°

hello guys πŸ˜„ Today i am sharing a collection of phishing pages of different sites including PAYPAL, INSTA, FACEBOOK, GOOGLE, SPOTIFY, NETFLIX and many more.

πŸ“₯ DOWNLOAD PHISHING PAGES -
https://get.itscybertech.com/phishing-pages

Most Of you already know how to use and setup phishing pages. But if you dont know how to setup it then read below guide.

βž–βž– SETUP PHISHING PAGESβž–βž–

β—½Step 1 -Register a free webhost. I am using 000webhost. Click here to register free webhost.
000webhost

β—½Step 2 - After you clicking above link. It will display a Sign Up page , Fill it with your Email , Password Give some Website Name.

β€’ Email - Your any Email.
β€’ Password - What you like
β€’ Website Name - link name for your phishing site.

β—½Step 4 - After successful Registration, You MAY see the dialog box

β—½Step 5- Now click Awaiting Email Confirmation and confirm your email address. (open your mail and click confirm)

β—½Step 7 - Now You need to open file manager of your website on webhost and then just find html folder or public html.

β—½Step 8- We will upload phishing files directly on public html folder. Done now share link with victim.

if victim will enter details you will get it on same folder in your file manager of 000webhost account

Share And Support us🌹 for more awesome Stuff

@geekcode
This media is not supported in your browser
VIEW IN TELEGRAM
This media is not supported in your browser
VIEW IN TELEGRAM