GeekCode
794 subscribers
452 photos
3 videos
7 files
942 links
🍁Cyber Security ❀️
🍁Hacking Resources πŸ‘¨β€πŸ’»

Providing knowledge to people'sπŸ₯€
Nobody gets smaller by sharing knowledge
You can also share your knowledge with us...πŸ™‚πŸ™‚

πŸ“°Promotion/Query - @geekcodevipbot
Download Telegram
✳️ How to Recover Data From Corrupted OS
βž–βž–βž–βž–βž–βž–βž–βž–βž–βž–βž–βž–βž–
⚜ We are going to use EaseUS data recovery to recover data from a crashed operating system. The software is mainly designed for data recovery cases of any operating system crash.

πŸ”ΉStep 1: First of all, launch EaseUS data recovery on a working computer. Select β€˜USB Drive’ from the list and click on β€˜Proceed’. Wait for few minutes until EaseUS data recovery creates a WinPE bootable disk.

πŸ”ΉStep 2: Once done, connect the bootable disk to the PC with the corrupted Windows system files. Restart the PC and press F2 during the start. This will run the EaseUS data recovery on the startup.

πŸ”ΉStep 3: Now it will show you the disk partitions. Select the disk where you want to recover data and then click on the β€˜Scan’ button.

πŸ”ΉStep 4: Now, wait for a few minutes until the tool scans for the available data. Once done, it will list all file types that can be recovered.

πŸ”ΉStep 5: You can either choose to preview or click on the β€˜Recover’ button to save the file. Make sure to choose a different drive or different USB to save the file.

βœ… That’s it, you are done! This is how you can use EaseUS data recovery to recover data from a Crashed operating system.

@geekcode πŸ“
#COURSE
Introduction to Python: Python for Beginners
This course is a great introduction to both fundamental python programming concepts and the Python programming language.

Getting Started,Values and Data Types, Operators and Operands, Function Calls
Write scripts for general productivity tasks Read and comprehend Python code Gain knowledge in regard to general programming concepts

Enroll Here -:

https://www.udemy.com/course/python-crash-course-for-beginners-l/?couponCode=6A6D2FDF808EC9C92928

#share & #supportus

-------------------> @geekcode πŸ“

Share as more as 😍
πŸ”° [Udemy] The RedTeam Blueprint - A Unique Guide To Ethical Hacking πŸ”°

Download Link:- https://mega.nz/folder/jckyXaaL#ro5gEgVSjsfDkUq5oAvmUA

⭕️Size: 20 GB

#share & #supportus

---------------> @geekcode πŸ“

Share as more as 😍
Awesome key-board shortcuts for data scientists! πŸ€“πŸ‘‡πŸΌ

https://www.linkedin.com/posts/mlindia_keyboard-shortcuts-for-data-scientist-activity-6716221331727290368-tRjf

#share & #supportus

-------------> @geekcode πŸ“

Share as more as 😍
CYBER SECURITY EVENT 😍
Virtual Cybersecurity Event Hosted by Devolutions  Yahoo Finance
https://finance.yahoo.com/news/virtual-cybersecurity-event-hosted-devolutions-150000750.html

#share & #supportus

----------------->
@geekcode πŸ“

Share as more as 😍
It’s bad enough that many ransomware gangs now have blogs where they publish data stolen from companies that refuse to make an extortion payment. Now, one crime group has started using hacked Facebook accounts to run ads publicly pressuring their ransomware victims into paying up.MediaOn the evening of Monday, Nov. 9, an ad campaign apparently taken out by the Ragnar Locker Team began appearing on Facebook. The ad was designed to turn the screws to the Italian beverage vendor Campari Group, which acknowledged on Nov. 3 that its computer systems had been sidelined by a malware attack.On Nov. 6, Campari issued a follow-up statement saying β€œat this stage, we cannot completely exclude that some personal and business data has been taken.β€β€œThis is ridiculous and looks like a big fat lie,” reads the Facebook ad campaign from the Ragnar crime group. β€œWe can confirm that confidential data was stolen and we talking about huge volume of data.”The ad went on to say Ragnar Locker Team had offloaded two terabytes of information and would give the Italian firm until 6 p.m. EST today (Nov. 10) to negotiate an extortion payment in exchange for a promise not to publish the stolen files.The Facebook ad blitz was paid for by Hodson Event Entertainment, an account tied to Chris Hodson, a deejay based in Chicago. Contacted by KrebsOnSecurity, Hodson said his Facebook account indeed was hacked, and that the attackers had budgeted $500 for the entire campaign.β€œI thought I had two-step verification turned on for all my accounts, but now it looks like the only one I didn’t have it set for was Facebook,” Hodson said.Hodson said a review of his account shows the unauthorized campaign reached approximately 7,150 Facebook users, and generated 770 clicks, with a cost-per-result of 21 cents. Of course, it didn’t cost the ransomware group anything. Hodson said Facebook billed him $35 for the first part of the campaign, but apparently detected the ads as fraudulent sometime this morning before his account could be billed another $159 for the campaign.MediaThe results of the unauthorized Facebook ad campaign. Image: Chris Hodson.It’s not clear whether this was an isolated incident, or whether the fraudsters also ran ads using other hacked Facebook accounts. A spokesperson for Facebook said the company is still investigating the incident. A request for comment sent via email to Campari’s media relations team was returned as undeliverable.But it seems likely we will continue to see more of this and other mainstream advertising efforts by ransomware groups going forward, even if victims really have no expectation that paying an extortion demand will result in criminals actually deleting or not otherwise using stolen data.Fabian Wosar, chief technology officer at computer security firm Emsisoft, said some ransomware groups have become especially aggressive of late in pressuring their victims to pay up.β€œThey have also started to call victims,” Wosar said. β€œThey’re outsourcing to Indian call centers, who call victims asking when they are going to pay or have their data leaked.”
https://krebsonsecurity.com/2020/11/ransomware-group-turns-to-facebook-ads/

#share & #supportus

-----------------> @geekcode πŸ“

Share as more as 😍
#COURSE
Learn Python Programming From A-Z: Beginner To Expert Course.

Enroll here-:

https://geekcode.com/python-AtoZ

#share & #supportus

------------------>
@geekcode πŸ“

Share as more as 😍
πŸ”° [Udemy] Linux Privilege Escalation for Beginners πŸ”°

Download Link πŸ”—-:https://mega.nz/folder/kllSCJaB#URQm1GHIopziyxn2Wg2caw

⭕️Size: 2.6 GB

#share & #supportus

------------------> @geekcode πŸ“

Share as more as 😍
This media is not supported in your browser
VIEW IN TELEGRAM
β€‹β€‹πŸ”° 30+ READYMADE PHISHING PAGES FOR HACKING, SPAMMINGπŸ”°

hello guys πŸ˜„ Today i am sharing a collection of phishing pages of different sites including PAYPAL, INSTA, FACEBOOK, GOOGLE, SPOTIFY, NETFLIX and many more.

πŸ“₯ DOWNLOAD PHISHING PAGES -
https://get.itscybertech.com/phishing-pages

Most Of you already know how to use and setup phishing pages. But if you dont know how to setup it then read below guide.

βž–βž– SETUP PHISHING PAGESβž–βž–

β—½Step 1 -Register a free webhost. I am using 000webhost. Click here to register free webhost.
000webhost

β—½Step 2 - After you clicking above link. It will display a Sign Up page , Fill it with your Email , Password Give some Website Name.

β€’ Email - Your any Email.
β€’ Password - What you like
β€’ Website Name - link name for your phishing site.

β—½Step 4 - After successful Registration, You MAY see the dialog box

β—½Step 5- Now click Awaiting Email Confirmation and confirm your email address. (open your mail and click confirm)

β—½Step 7 - Now You need to open file manager of your website on webhost and then just find html folder or public html.

β—½Step 8- We will upload phishing files directly on public html folder. Done now share link with victim.

if victim will enter details you will get it on same folder in your file manager of 000webhost account

Share And Support us🌹 for more awesome Stuff

@geekcode
This media is not supported in your browser
VIEW IN TELEGRAM
This media is not supported in your browser
VIEW IN TELEGRAM
πŸ”° [Udemy] Real world Hacking & Penetration testing: Version-1 πŸ”°

♻️Size:- 772 MB

⭕️Source link:-
https://www.udemy.com/course/real-world-hacking-penetration-testing/

⭕️Download link:-
https://drive.google.com/drive/folders/1-4dHS4gav7btrkyE8TQymfnhCyCjenN3

#share & #supportus

----------------->
@geekcode πŸ“

Share as more as 😍
This media is not supported in your browser
VIEW IN TELEGRAM
The best courses on coding, data science, and cybersecurity on sale this week  XDA Developers
https://www.xda-developers.com/the-best-courses-on-coding-data-science-and-cybersecurity-on-sale-this-week/

#share & #supportus

---------------->
@geekcode πŸ“

Share as more as 😍
This media is not supported in your browser
VIEW IN TELEGRAM