GeekCode
796 subscribers
452 photos
3 videos
7 files
942 links
🍁Cyber Security ❤️
🍁Hacking Resources 👨‍💻

Providing knowledge to people's🥀
Nobody gets smaller by sharing knowledge
You can also share your knowledge with us...🙂🙂

📰Promotion/Query - @geekcodevipbot
Download Telegram
GeekCode pinned «What is the domain transfer process? All registries have a process to transfer domain names from one owner to another. Generally, the process for doing this is as follows: Domain owner disables WHOIS/domain privacy so that the new registrar can verify ownership…»
This media is not supported in your browser
VIEW IN TELEGRAM
Forwarded from Cyber Agents
@cyberagents X @geekcode

For more cyber security & tech news join us
@cybergents ❤️
This media is not supported in your browser
VIEW IN TELEGRAM
This media is not supported in your browser
VIEW IN TELEGRAM
🎗️SANS CYBER ACES 🎗️

-> it is a free course by sans which is sort of a crash course in
-> os basics (windows , linux)
-> networking upto a good level
-> scripting (powershell,python,bash)

Link: https://tutorials.cyberaces.org/tutorials.html

~ @geekcode
This media is not supported in your browser
VIEW IN TELEGRAM
NETWORK SECURITY BIBLE

~ @geekcode
This media is not supported in your browser
VIEW IN TELEGRAM
What sherlock can do?

Social media accounts are rich sources of clues. One social media account may contain links to others which use different screen names, giving you another round of searching to include the newly discovered leads. Images from profile photos are easy to put into a reverse image search, allowing you to find other profiles using the same image whenever the target has a preferred profile photo.
Even the description text in a profile may often be copied and pasted between profiles, allowing you to search for profiles created with identical profile text or descriptions.

Installation of Sherlock:

~$ git clone https://github.com/sherlock-project/sherlock.git
~$ cd sherlock
~/sherlock$ pip3 install -r requirements.txt
~python3 sherlock.py -h

Thank you...!

~
@geekcode
This media is not supported in your browser
VIEW IN TELEGRAM
This media is not supported in your browser
VIEW IN TELEGRAM
What is MAC Address? Why we need to change ?

As a hacker prospective 👀


Each network card, whether it's a Wi-Fi card or a wired card, has a physical, static address, assigned by the card
manufacturer.
This is the Media Access Control (MAC) address. The MAC address is written on the card, and it's physical, so it never changes. It is used between devices, for identification and to transfer packets in the right direction. This works because each packet has a source MAC and a destination MAC, and travels from the source to the destination.
Because the MAC address is static and never changes, it can be used to trace back and identify a device. Also, since devices use MAC addresses to identify each other, we can have some networks that only allow certain MAC addresses to connect to them (by using a whitelist), or that blacklist MAC addresses so that they cannot connect to the network.
Changing your MAC address can help you to either connect to a network by being on a whitelist, or to bypass a blacklist.
The only way to change the MAC address is to change it in the RAM—so it will only be changed for the current session, and once you restart, you will have to change it again.

For query : @geekserverbot

~ @geekcode
Next post will be how to change MAC ADDRESS 😎!

HACKERs GANG 😈 @geekcode

#staytunned
This media is not supported in your browser
VIEW IN TELEGRAM
IP Address Fraud Checker

URL:
scamalytics.com

~
@geekcode ❤️
This media is not supported in your browser
VIEW IN TELEGRAM