GeekCode
794 subscribers
452 photos
3 videos
7 files
942 links
🍁Cyber Security ❀️
🍁Hacking Resources πŸ‘¨β€πŸ’»

Providing knowledge to people'sπŸ₯€
Nobody gets smaller by sharing knowledge
You can also share your knowledge with us...πŸ™‚πŸ™‚

πŸ“°Promotion/Query - @geekcodevipbot
Download Telegram
This media is not supported in your browser
VIEW IN TELEGRAM
πŸ”° Laralink v1.2.0 - Powerful URL Shortener Nulled Script Download πŸ”°

Ⓜ️Laralink is a link shortener, which allows you to manage links from a simple dashboard with advanced analytics.

πŸ”»Demo Link:
https://bit.ly/2YP7tHF

πŸ”»Download Link: https://bit.ly/31pjKnA

#share & #supportus

πŸ“ @geekcode πŸ“

Don't forget to join us πŸ‘‡πŸ»
πŸ”° Laralink v1.2.0 - Powerful URL Shortener Nulled Script Download πŸ”°

Ⓜ️Laralink is a link shortener, which allows you to manage links from a simple dashboard with advanced analytics.

πŸ”»Demo Link:
https://bit.ly/2YP7tHF

πŸ”»Download Link: https://bit.ly/31pjKnA

#share & #supportus

πŸ“ @geekcode πŸ“

Don't forget to join us πŸ‘‡πŸ»
πŸ”₯ ONE OF THE PAID COURSE COLLECTION πŸ”₯

1)Affiliate Marketing
2)Amazon FBA
3)Audio Book
4) Copywriting skill books
5) Cryptocurrency Course
7)E-books
8) Email Marketing

https://mega.nz/folder/zuB0lKjY#x3uWqSZhzvvC8EMVReDJag/folder/CyhgHQjI

#share & #supportus

πŸ“ @geekcode πŸ“

Don't forget to join us πŸ‘‡πŸ»
MUST KNOW CYBER SECURITY TIPS πŸ€™

READ POST ☝🏻

If you like our work, then share our channel and join please.
(❀️)

#share & #supportus

πŸ“ @geekcode πŸ“

Don't forget to join us πŸ‘‡πŸ»
This media is not supported in your browser
VIEW IN TELEGRAM
#course

Complete Cyber Security Masterclass: Beginner to Advance

Description πŸ“ƒ : Learn Cyber Security like a professional hacker! Start as a beginner and go all the way to launching cyber attacks.

Course Category πŸ“° : IT & Software

Course Length πŸ“ : 3 hours

Enroll Now πŸ‘‰ :

https://www.udemy.com/course/complete-cyber-security-masterclass-beginner-to-advance/?source=coursemania.xyz&couponCode=JUNAAR

#share & #supportus

πŸ“ @geekcode πŸ“

Don't forget to join us πŸ‘‡πŸ»
#technews
#neuralink

πŸ₯΅ Elon Musk has stated that Neuralink will demonstrate a working β€œdevice,” that is - a brain machine interface, at 6PM ET on Friday (today).

Set the reminder for this iconic event here.


#share & #supportus

πŸ“ @geekcode πŸ“

Don't forget to join us πŸ‘‡πŸ»
DO YOU SUPPORT US πŸ₯Ί?
(Need 50+ votes )
Anonymous Poll
95%
Yess !
5%
Noo!
Response please πŸ™πŸ™β˜πŸ»
This media is not supported in your browser
VIEW IN TELEGRAM
πŸ”°How to Access DarkWeb or DeepWeb πŸ”°

◼️Steps

⭕️There are many ways to access the dark web. Being a part of the deep net, dark web operates differently than the clear-net, and needs special client software to be accessed. While there are multiple ways to access the dark web, the most common and recommended method involves using TOR, and then visiting the .onion websites. All dark web website have a URL with .onion domain, which looks similar to the way the clear-net websites have .com, .org, .net, etc. Once you have TOR and find out the .onion address of a deep web site (hidden web site),you can simply enter it in the URL bar on TOR browser, and it'll open, just as normal websites open in usual browsers.

⭕️ If you read the previous boring section, you'd see that I mentioned how the dark net often uses uncommon communication protocols, etc. In case of the dark web, we see that phenomenon with respect to the onion websites. I won't go in much depth, but first look at a .onion URL suggests that it's similar to the clear-net websites. However, internally, the way they work is nothing similar to the clear-net. Precisely, .onion is not part of the internet's DNS root, and hence, normal DNS servers can't resolve your request if you type the URL of a .onion website on your browser. TOR redirects these requests through it's own servers, similar to the way proxies work, and then we get to the website, without the involvement of DNS servers anywhere. This ensures that search engine bots can't browse around the deep web, and that anonymity is maintained, both of the client looking at the web pages, as well as the server serving the web pages (In other words, the server doesn't know who the client is, and the client doesn't know anything about where the server is.)

Ⓜ️If you're using Windows, you can download the Tor executable on web..versions for linux and mac available also you can use in your android device but it's not safe.

#share & #supportus
@geekcode
GeekCode pinned Β«πŸ”°How to Access DarkWeb or DeepWeb πŸ”° ◼️Steps ⭕️There are many ways to access the dark web. Being a part of the deep net, dark web operates differently than the clear-net, and needs special client software to be accessed. While there are multiple ways to access…»
πŸ”° CCSA R80 Checkpoint Cbt Nuggets πŸ”°

Download link:-
https://drive.google.com/folderview?id=10WG7Kzz-vdN5j8iRQBgU7EFrFlYqSb0a

#share & #supportus

πŸ“ @geekcode πŸ“

Don't forget to join us πŸ‘‡πŸ»
πŸ”°5 Basic Tools For Password CrackingπŸ”°

β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”
#1 John The Ripper :- John the Ripper is a free password cracking software tool. Originally developed for the Unix operating system, it can run on fifteen different platform.

#2 NCrack :- Crack is a Unix password cracking program designed to allow system administrators to locate users who may have weak passwords vulnerable to a dictionary attack. Crack was the first standalone password cracker for Unix systems and the first to introduce programmable dictionary generation.

#3 Hydra :- Hydra is a parallelized password cracker which supports numerous protocols to attack. It is very fast and flexible, and new modules are easy to add. This tool makes it possible for researchers and security consultants to show how easy it would be to gain unauthorized access to a system remotely.

#4 Medusa :- Medusa is a speedy, massively parallel, modular, login brute-forcer for network services created by the geeks at
Foofus.net. It currently has modules for the following services: CVS, FTP, HTTP, IMAP, MS-SQL, MySQL, NCP (NetWare), PcAnywhere, POP3, PostgreSQL, rexec, rlogin, rsh, SMB, SMTP (VRFY), SNMP, SSHv2, SVN, Telnet, VmAuthd, VNC, and a generic wrapper module.

#5 Aircrack-ng : Aircrack-ng is a Free and a Very Common Tool Used for Cracking Password of WPA,WPA2 Hashesh. It is Mainly Used For Wireless Pen Testing. By Using Aircrack-ng You Can Crack Passwords Via Brute Force or Wordlist Based Attack.

#share & #supportus

πŸ“
@geekcode πŸ“

Don't forget to join us 😍
Linux for Absolute Beginners!

Get started with Linux, app development, server configuration, networking, and become a system administrator!

https://www.udemy.com/course/linux-system-admin/?Join-@UdemyFree4You&couponCode=FREEAUG

#share & #supportus

πŸ“ @geekcode πŸ“

Don't forget to join us πŸ‘‡πŸ»
GeekCode pinned Β«πŸ”°5 Basic Tools For Password CrackingπŸ”° β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€” #1 John The Ripper :- John the Ripper is a free password cracking software tool. Originally developed for the Unix operating system, it can run on fifteen different platform. #2 NCrack…»