βοΈAndroid Security booksβοΈ
https://github.com/saeidshirazi/awesome-android-security#books
#share & #supportus
---------------> @geekcode π
Share as more as π
https://github.com/saeidshirazi/awesome-android-security#books
#share & #supportus
---------------> @geekcode π
Share as more as π
GitHub
GitHub - saeidshirazi/awesome-android-security: A curated list of Android Security materials and resources For Pentesters and Bugβ¦
A curated list of Android Security materials and resources For Pentesters and Bug Hunters - saeidshirazi/awesome-android-security
π° JavaScript Fundamentals: A Course For Absolute Beginners π°
Learn JavaScript Fundamentals from the Scratch.
Link :- https://www.udemy.com/course/javascript-fundamentals-a-course-for-absolute-beginners/?ranMID=39197&LSNPUBID=bnwWbXPyqPU&ranMID=39197&ranEAID=NuZiHLoAApo&ranSiteID=NuZiHLoAApo-0XptatQhC2ZudCXNiiumNg&LSNPUBID=NuZiHLoAApo&utm_source=aff-campaign&utm_medium=udemyads&couponCode=38C873CC48B5A4C5A39C
#share & #supportus
-------------------> @geekcode π
Share as more as π
Learn JavaScript Fundamentals from the Scratch.
Link :- https://www.udemy.com/course/javascript-fundamentals-a-course-for-absolute-beginners/?ranMID=39197&LSNPUBID=bnwWbXPyqPU&ranMID=39197&ranEAID=NuZiHLoAApo&ranSiteID=NuZiHLoAApo-0XptatQhC2ZudCXNiiumNg&LSNPUBID=NuZiHLoAApo&utm_source=aff-campaign&utm_medium=udemyads&couponCode=38C873CC48B5A4C5A39C
#share & #supportus
-------------------> @geekcode π
Share as more as π
β³οΈ How to Recover Data From Corrupted OS
βββββββββββββ
β We are going to use EaseUS data recovery to recover data from a crashed operating system. The software is mainly designed for data recovery cases of any operating system crash.
πΉStep 1: First of all, launch EaseUS data recovery on a working computer. Select βUSB Driveβ from the list and click on βProceedβ. Wait for few minutes until EaseUS data recovery creates a WinPE bootable disk.
πΉStep 2: Once done, connect the bootable disk to the PC with the corrupted Windows system files. Restart the PC and press F2 during the start. This will run the EaseUS data recovery on the startup.
πΉStep 3: Now it will show you the disk partitions. Select the disk where you want to recover data and then click on the βScanβ button.
πΉStep 4: Now, wait for a few minutes until the tool scans for the available data. Once done, it will list all file types that can be recovered.
πΉStep 5: You can either choose to preview or click on the βRecoverβ button to save the file. Make sure to choose a different drive or different USB to save the file.
β Thatβs it, you are done! This is how you can use EaseUS data recovery to recover data from a Crashed operating system.
@geekcode π
βββββββββββββ
β We are going to use EaseUS data recovery to recover data from a crashed operating system. The software is mainly designed for data recovery cases of any operating system crash.
πΉStep 1: First of all, launch EaseUS data recovery on a working computer. Select βUSB Driveβ from the list and click on βProceedβ. Wait for few minutes until EaseUS data recovery creates a WinPE bootable disk.
πΉStep 2: Once done, connect the bootable disk to the PC with the corrupted Windows system files. Restart the PC and press F2 during the start. This will run the EaseUS data recovery on the startup.
πΉStep 3: Now it will show you the disk partitions. Select the disk where you want to recover data and then click on the βScanβ button.
πΉStep 4: Now, wait for a few minutes until the tool scans for the available data. Once done, it will list all file types that can be recovered.
πΉStep 5: You can either choose to preview or click on the βRecoverβ button to save the file. Make sure to choose a different drive or different USB to save the file.
β Thatβs it, you are done! This is how you can use EaseUS data recovery to recover data from a Crashed operating system.
@geekcode π
What a Joe Biden Presidency Means for Cybersecurity BankInfoSecurity.com
https://www.bankinfosecurity.com/what-joe-biden-presidency-means-for-cybersecurity-a-15328
@geekcode π
https://www.bankinfosecurity.com/what-joe-biden-presidency-means-for-cybersecurity-a-15328
@geekcode π
Bankinfosecurity
What a Joe Biden Presidency Means for Cybersecurity
President-elect Joe Biden's approach to cybersecurity will likely mirror that of his old boss, former President Barack Obama. Expect Biden's White House to increase
#COURSE
Introduction to Python: Python for Beginners
This course is a great introduction to both fundamental python programming concepts and the Python programming language.
Getting Started,Values and Data Types, Operators and Operands, Function Calls
Write scripts for general productivity tasks Read and comprehend Python code Gain knowledge in regard to general programming concepts
Enroll Here -:
https://www.udemy.com/course/python-crash-course-for-beginners-l/?couponCode=6A6D2FDF808EC9C92928
#share & #supportus
-------------------> @geekcode π
Share as more as π
Introduction to Python: Python for Beginners
This course is a great introduction to both fundamental python programming concepts and the Python programming language.
Getting Started,Values and Data Types, Operators and Operands, Function Calls
Write scripts for general productivity tasks Read and comprehend Python code Gain knowledge in regard to general programming concepts
Enroll Here -:
https://www.udemy.com/course/python-crash-course-for-beginners-l/?couponCode=6A6D2FDF808EC9C92928
#share & #supportus
-------------------> @geekcode π
Share as more as π
π° [Udemy] The RedTeam Blueprint - A Unique Guide To Ethical Hacking π°
Download Link:- https://mega.nz/folder/jckyXaaL#ro5gEgVSjsfDkUq5oAvmUA
βοΈSize: 20 GB
#share & #supportus
---------------> @geekcode π
Share as more as π
Download Link:- https://mega.nz/folder/jckyXaaL#ro5gEgVSjsfDkUq5oAvmUA
βοΈSize: 20 GB
#share & #supportus
---------------> @geekcode π
Share as more as π
Awesome key-board shortcuts for data scientists! π€ππΌ
https://www.linkedin.com/posts/mlindia_keyboard-shortcuts-for-data-scientist-activity-6716221331727290368-tRjf
#share & #supportus
-------------> @geekcode π
Share as more as π
https://www.linkedin.com/posts/mlindia_keyboard-shortcuts-for-data-scientist-activity-6716221331727290368-tRjf
#share & #supportus
-------------> @geekcode π
Share as more as π
Virtual Cybersecurity Event Hosted by Devolutions Yahoo Finance
https://finance.yahoo.com/news/virtual-cybersecurity-event-hosted-devolutions-150000750.html
#share & #supportus
-----------------> @geekcode π
Share as more as π
https://finance.yahoo.com/news/virtual-cybersecurity-event-hosted-devolutions-150000750.html
#share & #supportus
-----------------> @geekcode π
Share as more as π
Itβs bad enough that many ransomware gangs now have blogs where they publish data stolen from companies that refuse to make an extortion payment. Now, one crime group has started using hacked Facebook accounts to run ads publicly pressuring their ransomware victims into paying up.MediaOn the evening of Monday, Nov. 9, an ad campaign apparently taken out by the Ragnar Locker Team began appearing on Facebook. The ad was designed to turn the screws to the Italian beverage vendor Campari Group, which acknowledged on Nov. 3 that its computer systems had been sidelined by a malware attack.On Nov. 6, Campari issued a follow-up statement saying βat this stage, we cannot completely exclude that some personal and business data has been taken.ββThis is ridiculous and looks like a big fat lie,β reads the Facebook ad campaign from the Ragnar crime group. βWe can confirm that confidential data was stolen and we talking about huge volume of data.βThe ad went on to say Ragnar Locker Team had offloaded two terabytes of information and would give the Italian firm until 6 p.m. EST today (Nov. 10) to negotiate an extortion payment in exchange for a promise not to publish the stolen files.The Facebook ad blitz was paid for by Hodson Event Entertainment, an account tied to Chris Hodson, a deejay based in Chicago. Contacted by KrebsOnSecurity, Hodson said his Facebook account indeed was hacked, and that the attackers had budgeted $500 for the entire campaign.βI thought I had two-step verification turned on for all my accounts, but now it looks like the only one I didnβt have it set for was Facebook,β Hodson said.Hodson said a review of his account shows the unauthorized campaign reached approximately 7,150 Facebook users, and generated 770 clicks, with a cost-per-result of 21 cents. Of course, it didnβt cost the ransomware group anything. Hodson said Facebook billed him $35 for the first part of the campaign, but apparently detected the ads as fraudulent sometime this morning before his account could be billed another $159 for the campaign.MediaThe results of the unauthorized Facebook ad campaign. Image: Chris Hodson.Itβs not clear whether this was an isolated incident, or whether the fraudsters also ran ads using other hacked Facebook accounts. A spokesperson for Facebook said the company is still investigating the incident. A request for comment sent via email to Campariβs media relations team was returned as undeliverable.But it seems likely we will continue to see more of this and other mainstream advertising efforts by ransomware groups going forward, even if victims really have no expectation that paying an extortion demand will result in criminals actually deleting or not otherwise using stolen data.Fabian Wosar, chief technology officer at computer security firm Emsisoft, said some ransomware groups have become especially aggressive of late in pressuring their victims to pay up.βThey have also started to call victims,β Wosar said. βTheyβre outsourcing to Indian call centers, who call victims asking when they are going to pay or have their data leaked.β
https://krebsonsecurity.com/2020/11/ransomware-group-turns-to-facebook-ads/
#share & #supportus
-----------------> @geekcode π
Share as more as π
https://krebsonsecurity.com/2020/11/ransomware-group-turns-to-facebook-ads/
#share & #supportus
-----------------> @geekcode π
Share as more as π
#COURSE
Learn Python Programming From A-Z: Beginner To Expert Course.
Enroll here-:
https://geekcode.com/python-AtoZ
#share & #supportus
------------------> @geekcode π
Share as more as π
Learn Python Programming From A-Z: Beginner To Expert Course.
Enroll here-:
https://geekcode.com/python-AtoZ
#share & #supportus
------------------> @geekcode π
Share as more as π
π° [Udemy] Linux Privilege Escalation for Beginners π°
Download Link π-:https://mega.nz/folder/kllSCJaB#URQm1GHIopziyxn2Wg2caw
βοΈSize: 2.6 GB
#share & #supportus
------------------> @geekcode π
Share as more as π
Download Link π-:https://mega.nz/folder/kllSCJaB#URQm1GHIopziyxn2Wg2caw
βοΈSize: 2.6 GB
#share & #supportus
------------------> @geekcode π
Share as more as π
HTTP Request Smuggling in 2020
https://i.blackhat.com/USA-20/Wednesday/us-20-Klein-HTTP-Request-Smuggling-In-2020-New-Variants-New-Defenses-And-New-Challenges.pdf
#share & #supportus
-----------------> @geekcode π
Share as more as π
https://i.blackhat.com/USA-20/Wednesday/us-20-Klein-HTTP-Request-Smuggling-In-2020-New-Variants-New-Defenses-And-New-Challenges.pdf
#share & #supportus
-----------------> @geekcode π
Share as more as π
ββπ° 30+ READYMADE PHISHING PAGES FOR HACKING, SPAMMINGπ°
hello guys π Today i am sharing a collection of phishing pages of different sites including PAYPAL, INSTA, FACEBOOK, GOOGLE, SPOTIFY, NETFLIX and many more.
π₯ DOWNLOAD PHISHING PAGES -
https://get.itscybertech.com/phishing-pages
Most Of you already know how to use and setup phishing pages. But if you dont know how to setup it then read below guide.
ββ SETUP PHISHING PAGESββ
β½Step 1 -Register a free webhost. I am using 000webhost. Click here to register free webhost.
000webhost
β½Step 2 - After you clicking above link. It will display a Sign Up page , Fill it with your Email , Password Give some Website Name.
β’ Email - Your any Email.
β’ Password - What you like
β’ Website Name - link name for your phishing site.
β½Step 4 - After successful Registration, You MAY see the dialog box
β½Step 5- Now click Awaiting Email Confirmation and confirm your email address. (open your mail and click confirm)
β½Step 7 - Now You need to open file manager of your website on webhost and then just find html folder or public html.
β½Step 8- We will upload phishing files directly on public html folder. Done now share link with victim.
if victim will enter details you will get it on same folder in your file manager of 000webhost account
Share And Support usπΉ for more awesome Stuff
@geekcode
hello guys π Today i am sharing a collection of phishing pages of different sites including PAYPAL, INSTA, FACEBOOK, GOOGLE, SPOTIFY, NETFLIX and many more.
π₯ DOWNLOAD PHISHING PAGES -
https://get.itscybertech.com/phishing-pages
Most Of you already know how to use and setup phishing pages. But if you dont know how to setup it then read below guide.
ββ SETUP PHISHING PAGESββ
β½Step 1 -Register a free webhost. I am using 000webhost. Click here to register free webhost.
000webhost
β½Step 2 - After you clicking above link. It will display a Sign Up page , Fill it with your Email , Password Give some Website Name.
β’ Email - Your any Email.
β’ Password - What you like
β’ Website Name - link name for your phishing site.
β½Step 4 - After successful Registration, You MAY see the dialog box
β½Step 5- Now click Awaiting Email Confirmation and confirm your email address. (open your mail and click confirm)
β½Step 7 - Now You need to open file manager of your website on webhost and then just find html folder or public html.
β½Step 8- We will upload phishing files directly on public html folder. Done now share link with victim.
if victim will enter details you will get it on same folder in your file manager of 000webhost account
Share And Support usπΉ for more awesome Stuff
@geekcode
Enroll Here -:
https://www.udemy.com/course/csharp-fundamentals/?ranMID=39197&ranEAID=NuZiHLoAApo&ranSiteID=NuZiHLoAApo-Y_cKJXnHwSX3MeC_NLyn_w&LSNPUBID=NuZiHLoAApo&utm_source=aff-campaign&utm_medium=udemyads&couponCode=EFBA7982021978C9539E
#share & #supportus
---------------> @geekcode π
Share as more as π
https://www.udemy.com/course/csharp-fundamentals/?ranMID=39197&ranEAID=NuZiHLoAApo&ranSiteID=NuZiHLoAApo-Y_cKJXnHwSX3MeC_NLyn_w&LSNPUBID=NuZiHLoAApo&utm_source=aff-campaign&utm_medium=udemyads&couponCode=EFBA7982021978C9539E
#share & #supportus
---------------> @geekcode π
Share as more as π
π° [Udemy] Real world Hacking & Penetration testing: Version-1 π°
β»οΈSize:- 772 MB
βοΈSource link:-
https://www.udemy.com/course/real-world-hacking-penetration-testing/
βοΈDownload link:-
https://drive.google.com/drive/folders/1-4dHS4gav7btrkyE8TQymfnhCyCjenN3
#share & #supportus
-----------------> @geekcode π
Share as more as π
β»οΈSize:- 772 MB
βοΈSource link:-
https://www.udemy.com/course/real-world-hacking-penetration-testing/
βοΈDownload link:-
https://drive.google.com/drive/folders/1-4dHS4gav7btrkyE8TQymfnhCyCjenN3
#share & #supportus
-----------------> @geekcode π
Share as more as π