GeekCode
797 subscribers
452 photos
3 videos
7 files
942 links
🍁Cyber Security ❤️
🍁Hacking Resources 👨‍💻

Providing knowledge to people's🥀
Nobody gets smaller by sharing knowledge
You can also share your knowledge with us...🙂🙂

📰Promotion/Query - @geekcodevipbot
Download Telegram
This media is not supported in your browser
VIEW IN TELEGRAM
🏅 Certification for information security specialists.

@geekcode #Roadmap
👍2
This media is not supported in your browser
VIEW IN TELEGRAM
This media is not supported in your browser
VIEW IN TELEGRAM
Forwarded from GeekCode
Best Tools to protect your online privacy these days

Privacy should be the top priority of anyone doing their business online, especially on Telegram , Darknet

Most of you may know many of the tools mentioned in this post but I feel compiling a good list never hurts

Step 1 - VPN

Staying anonymous should be a second nature to everyone online. You can use free/paid software for that.
One should look for a VPN that does not keep logs and even the country they are based from is also know for pro-privacy rules.

Top free software:

TOR/TAILS
Your own proxy/vpn setup using linux scripts and VPS
Top paid VPN software:

iPredator (Sweden)
Mullvad (Sweden)
ProtonVPN (Switzerland)
ExpressVPN (British Virgin Islands)
NordVPN (Panama) - LQ but adding it

Step 2 - Emails

Use email providers that protect user privacy and also have encryption methods implemented in their mail system.
You can use any of the above emails to register on forums, buy subscriptions and even for personal use irl to protect your privacy:


Protonmail.com
Tutanota.com
Yandex.com
Posteo.de
Mailfence
Hushmail

Step 3 - Payments

Always try to use cryptocurrencies for payments, as much as you can. One should even consider using XMR (Monero) as it is completely anonymous and there is no public track on its blockchain. Howeven, If you use standard crypto, make sure you use a desktop version wallet and have taken a privacy steps first so you actually use it without exposing your real IP.

Step 4 - Purchasing Domains / Hosting

Njal.la is your best bet for domain registry. They use their own information to register the domain name for you. Fees are high, but worth every single cent when you view at this at the long term .


Best domain extensions for privacy:

Avoid using .com / .net / .org etc common domain extensions. Always try to use domain extensions from islands nations that are not covered by most digital worldwide laws.
Some examples include .is, .gd, .la
More info on domain extensions can be found on wikipedia here

Additional Pointers

1) Always get WHOIS privacy even if you'll have to pay extra for it

2) Use a sandbox / rdp to test any program and always scan (can use virustotal) and keep your system clean of malwares. Malwarebytes is a must and keys are not that expensive

3) It never hurts to use Virustotal to scan any programs etc for all kinds of stuff people jack in them

@geekcode
👍21
This media is not supported in your browser
VIEW IN TELEGRAM
|AppSec Ezine|

📰465rd Edition
Release Date: 13/01/2023
pathonproject
github

@geekcode #appsec
This media is not supported in your browser
VIEW IN TELEGRAM
This media is not supported in your browser
VIEW IN TELEGRAM
ChatGPT - for RedTeam and BlueTeam

Good article with good examples

Read
OpenAI ChatGPT for Cyber Security

If there is no OpenAI account, you can try your hand at our bot

#openAI
@geekcode
This media is not supported in your browser
VIEW IN TELEGRAM
RedTeam-Tools
Tools and techniques for Red Team
over 100 tools
download

#red #pentest #tools

@geekcode
This media is not supported in your browser
VIEW IN TELEGRAM
How to avoid phishing attacks😈

📌Block known bad websites. Malwarebytes DNS filtering blocks malicious websites used for phishing attacks, as well as websites used to spread or control malware.

📌Don't take things at face value. Phishing attacks often seem to come from people or brands you know, and use themes that require urgent attention, such as missed deliveries, account suspensions, and security alerts.

📌Take action. If you receive a phishing attempt at work, report it to your IT or security team. I you fall for a phish, make your data useless: If you entered a password, change it, if you entered credit card details, cancel the card.

📌Use a password manager. Password managers can create, remember, and fill in passwords for you. They protect you against phishing because they won't enter your credentials into a fake site.

📌Use a FIDO2 2FA device. Some forms of two-factor authentication (2FA) can be phished just as easily as a password. 2FA that relies on a FIDO2 device can’t be phished.

Don't forget to share & support us ❤️

@geekcode 😈
👍1
This media is not supported in your browser
VIEW IN TELEGRAM
This media is not supported in your browser
VIEW IN TELEGRAM