π° [Udemy] Linux Privilege Escalation for Beginners π°
Download Link π-:https://mega.nz/folder/kllSCJaB#URQm1GHIopziyxn2Wg2caw
βοΈSize: 2.6 GB
#share & #supportus
------------------> @geekcode π
Share as more as π
Download Link π-:https://mega.nz/folder/kllSCJaB#URQm1GHIopziyxn2Wg2caw
βοΈSize: 2.6 GB
#share & #supportus
------------------> @geekcode π
Share as more as π
HTTP Request Smuggling in 2020
https://i.blackhat.com/USA-20/Wednesday/us-20-Klein-HTTP-Request-Smuggling-In-2020-New-Variants-New-Defenses-And-New-Challenges.pdf
#share & #supportus
-----------------> @geekcode π
Share as more as π
https://i.blackhat.com/USA-20/Wednesday/us-20-Klein-HTTP-Request-Smuggling-In-2020-New-Variants-New-Defenses-And-New-Challenges.pdf
#share & #supportus
-----------------> @geekcode π
Share as more as π
ββπ° 30+ READYMADE PHISHING PAGES FOR HACKING, SPAMMINGπ°
hello guys π Today i am sharing a collection of phishing pages of different sites including PAYPAL, INSTA, FACEBOOK, GOOGLE, SPOTIFY, NETFLIX and many more.
π₯ DOWNLOAD PHISHING PAGES -
https://get.itscybertech.com/phishing-pages
Most Of you already know how to use and setup phishing pages. But if you dont know how to setup it then read below guide.
ββ SETUP PHISHING PAGESββ
β½Step 1 -Register a free webhost. I am using 000webhost. Click here to register free webhost.
000webhost
β½Step 2 - After you clicking above link. It will display a Sign Up page , Fill it with your Email , Password Give some Website Name.
β’ Email - Your any Email.
β’ Password - What you like
β’ Website Name - link name for your phishing site.
β½Step 4 - After successful Registration, You MAY see the dialog box
β½Step 5- Now click Awaiting Email Confirmation and confirm your email address. (open your mail and click confirm)
β½Step 7 - Now You need to open file manager of your website on webhost and then just find html folder or public html.
β½Step 8- We will upload phishing files directly on public html folder. Done now share link with victim.
if victim will enter details you will get it on same folder in your file manager of 000webhost account
Share And Support usπΉ for more awesome Stuff
@geekcode
hello guys π Today i am sharing a collection of phishing pages of different sites including PAYPAL, INSTA, FACEBOOK, GOOGLE, SPOTIFY, NETFLIX and many more.
π₯ DOWNLOAD PHISHING PAGES -
https://get.itscybertech.com/phishing-pages
Most Of you already know how to use and setup phishing pages. But if you dont know how to setup it then read below guide.
ββ SETUP PHISHING PAGESββ
β½Step 1 -Register a free webhost. I am using 000webhost. Click here to register free webhost.
000webhost
β½Step 2 - After you clicking above link. It will display a Sign Up page , Fill it with your Email , Password Give some Website Name.
β’ Email - Your any Email.
β’ Password - What you like
β’ Website Name - link name for your phishing site.
β½Step 4 - After successful Registration, You MAY see the dialog box
β½Step 5- Now click Awaiting Email Confirmation and confirm your email address. (open your mail and click confirm)
β½Step 7 - Now You need to open file manager of your website on webhost and then just find html folder or public html.
β½Step 8- We will upload phishing files directly on public html folder. Done now share link with victim.
if victim will enter details you will get it on same folder in your file manager of 000webhost account
Share And Support usπΉ for more awesome Stuff
@geekcode
Enroll Here -:
https://www.udemy.com/course/csharp-fundamentals/?ranMID=39197&ranEAID=NuZiHLoAApo&ranSiteID=NuZiHLoAApo-Y_cKJXnHwSX3MeC_NLyn_w&LSNPUBID=NuZiHLoAApo&utm_source=aff-campaign&utm_medium=udemyads&couponCode=EFBA7982021978C9539E
#share & #supportus
---------------> @geekcode π
Share as more as π
https://www.udemy.com/course/csharp-fundamentals/?ranMID=39197&ranEAID=NuZiHLoAApo&ranSiteID=NuZiHLoAApo-Y_cKJXnHwSX3MeC_NLyn_w&LSNPUBID=NuZiHLoAApo&utm_source=aff-campaign&utm_medium=udemyads&couponCode=EFBA7982021978C9539E
#share & #supportus
---------------> @geekcode π
Share as more as π
π° [Udemy] Real world Hacking & Penetration testing: Version-1 π°
β»οΈSize:- 772 MB
βοΈSource link:-
https://www.udemy.com/course/real-world-hacking-penetration-testing/
βοΈDownload link:-
https://drive.google.com/drive/folders/1-4dHS4gav7btrkyE8TQymfnhCyCjenN3
#share & #supportus
-----------------> @geekcode π
Share as more as π
β»οΈSize:- 772 MB
βοΈSource link:-
https://www.udemy.com/course/real-world-hacking-penetration-testing/
βοΈDownload link:-
https://drive.google.com/drive/folders/1-4dHS4gav7btrkyE8TQymfnhCyCjenN3
#share & #supportus
-----------------> @geekcode π
Share as more as π
The best courses on coding, data science, and cybersecurity on sale this week XDA Developers
https://www.xda-developers.com/the-best-courses-on-coding-data-science-and-cybersecurity-on-sale-this-week/
#share & #supportus
----------------> @geekcode π
Share as more as π
https://www.xda-developers.com/the-best-courses-on-coding-data-science-and-cybersecurity-on-sale-this-week/
#share & #supportus
----------------> @geekcode π
Share as more as π
β¨οΈHow To Change IMEI Number
β Root Required
πSteps
1. Download Xposed Installer
2. Install it
3. Download IMEI pro apk
4. Install it
5. Open Xposed Installer
6. Go to sidebar (menu)
7. Click on Modules
8. Check IMEI apk Module
9. Reboot Your device
10. Open IMEI apk
11. Change IMEI
12. Reboot Your Device
#share & #supportus
-----------------> @geekcode π
Share as more as π
β Root Required
πSteps
1. Download Xposed Installer
2. Install it
3. Download IMEI pro apk
4. Install it
5. Open Xposed Installer
6. Go to sidebar (menu)
7. Click on Modules
8. Check IMEI apk Module
9. Reboot Your device
10. Open IMEI apk
11. Change IMEI
12. Reboot Your Device
#share & #supportus
-----------------> @geekcode π
Share as more as π
β¨οΈHow To View Saved Wifi Passwords In Android πΆ
βββββββββββββββ
π Using File Managers:
π First of all, you need a file explorer that gives you the read access to the root folder. If your default File manager doesnβt give you the read access to the root folder, then you can install Root Explorer or Super Manager which will grant superuser permission to you to access the system folder
1οΈβ£ Go to data/misc/wifi folder, and you will find a file named wpa_supplicant.conf.
οΈ2οΈβ£ Open the file and make sure to open the file in built-in text/HTMLviewer for the task. Now in this file, you will be able to see the network SSID and their passwords next to it.
π Now note down the network name and its password. In this way, you will be able to view all saved WiFi password on the Android device.
β οΈ Note: Please do not edit anything in wpa_supplicant.conf as it can alter your device working or it will have the effect on your WiFi connectivity.
π ES File Explorer:
1οΈβ£ Download and Install ES File Explorer App on your Android device and open the app.
2οΈβ£ Now you need to enable the βRoot Explorerβ option in ES File Explorer.
3οΈβ£ Now you need to move to the Root folder in ES File Explorer, and you need to find a directory called βData.β
4οΈβ£ Now under the βDataβ you need to locate the folder βMiscβ
5οΈβ£ Now under the WiFi folder, you need to locate the file with name wpa_supplicant.conf. Simply open the file with ES File Explorerβs built-in text/HTML viewer.
6οΈβ£ Now you can see all your SSID (network name) along with PSK (Password) next to it and close the file.
β Thatβs it! You are done, this is how you can find saved WiFi password using ES file explorer.
#share & #supportus
----------------> @geekcode π
Share as more as π
βββββββββββββββ
π Using File Managers:
π First of all, you need a file explorer that gives you the read access to the root folder. If your default File manager doesnβt give you the read access to the root folder, then you can install Root Explorer or Super Manager which will grant superuser permission to you to access the system folder
1οΈβ£ Go to data/misc/wifi folder, and you will find a file named wpa_supplicant.conf.
οΈ2οΈβ£ Open the file and make sure to open the file in built-in text/HTMLviewer for the task. Now in this file, you will be able to see the network SSID and their passwords next to it.
π Now note down the network name and its password. In this way, you will be able to view all saved WiFi password on the Android device.
β οΈ Note: Please do not edit anything in wpa_supplicant.conf as it can alter your device working or it will have the effect on your WiFi connectivity.
π ES File Explorer:
1οΈβ£ Download and Install ES File Explorer App on your Android device and open the app.
2οΈβ£ Now you need to enable the βRoot Explorerβ option in ES File Explorer.
3οΈβ£ Now you need to move to the Root folder in ES File Explorer, and you need to find a directory called βData.β
4οΈβ£ Now under the βDataβ you need to locate the folder βMiscβ
5οΈβ£ Now under the WiFi folder, you need to locate the file with name wpa_supplicant.conf. Simply open the file with ES File Explorerβs built-in text/HTML viewer.
6οΈβ£ Now you can see all your SSID (network name) along with PSK (Password) next to it and close the file.
β Thatβs it! You are done, this is how you can find saved WiFi password using ES file explorer.
#share & #supportus
----------------> @geekcode π
Share as more as π
#Enroll
Build Application for Google Assistant
Development of application for Google Assistant
Enroll Here-:
https://www.udemy.com/course/build-action-on-google/?couponCode=FREEDIWALI
#share & #supportus
------------------> @geekcode π
Share as more as π
Build Application for Google Assistant
Development of application for Google Assistant
Enroll Here-:
https://www.udemy.com/course/build-action-on-google/?couponCode=FREEDIWALI
#share & #supportus
------------------> @geekcode π
Share as more as π
Potential Security Threats To Your Computer Systems?
A computer system threat is anything that leads to loss or corruption of data or physical damage to the hardware and/or infrastructure. Knowing how to identify computer security threats is the first step in protecting computer systems. The threats could be intentional, accidental or caused by natural disasters.
In this article, we will introduce you to the common computer system threats and how you can protect systems against them.
#share & #supportus
------------------> @geekcode π
Share as more as π
A computer system threat is anything that leads to loss or corruption of data or physical damage to the hardware and/or infrastructure. Knowing how to identify computer security threats is the first step in protecting computer systems. The threats could be intentional, accidental or caused by natural disasters.
In this article, we will introduce you to the common computer system threats and how you can protect systems against them.
#share & #supportus
------------------> @geekcode π
Share as more as π
What is a Security Threat?
Security Threat is defined as a risk that which can potentially harm computer systems and organization. The cause could be physical such as someone stealing a computer that contains vital data. The cause could also be non-physical such as a virus attack. In these tutorial series, we will define a threat as a potential attack from a hacker that can allow them to gain unauthorized access to a computer system.
#share & #supportus
-------------------> @geekcode π
Share as more as π
Security Threat is defined as a risk that which can potentially harm computer systems and organization. The cause could be physical such as someone stealing a computer that contains vital data. The cause could also be non-physical such as a virus attack. In these tutorial series, we will define a threat as a potential attack from a hacker that can allow them to gain unauthorized access to a computer system.
#share & #supportus
-------------------> @geekcode π
Share as more as π
What are Physical Threats?
A physical threat is a potential cause of an incident that may result in loss or physical damage to the computer systems.
The following list classifies the physical threats into three (3) main categories;
Internal: The threats include fire, unstable power supply, humidity in the rooms housing the hardware, etc.
External: These threats include Lightning, floods, earthquakes, etc.
Human: These threats include theft, vandalism of the infrastructure and/or hardware, disruption, accidental or intentional errors.
To protect computer systems from the above mentioned physical threats, an organization must have physical security control measures.
The following list shows some of the possible measures that can be taken:
Internal: Fire threats could be prevented by the use of automatic fire detectors and extinguishers that do not use water to put out a fire. The unstable power supply can be prevented by the use of voltage controllers. An air conditioner can be used to control the humidity in the computer room.
External: Lightning protection systems can be used to protect computer systems against such attacks. Lightning protection systems are not 100% perfect, but to a certain extent, they reduce the chances of Lightning causing damage. Housing computer systems in high lands are one of the possible ways of protecting systems against floods.
Humans: Threats such as theft can be prevented by use of locked doors and restricted access to computer rooms.
#share & #supportus
-------------------> @geekcode π
Share as more as π
A physical threat is a potential cause of an incident that may result in loss or physical damage to the computer systems.
The following list classifies the physical threats into three (3) main categories;
Internal: The threats include fire, unstable power supply, humidity in the rooms housing the hardware, etc.
External: These threats include Lightning, floods, earthquakes, etc.
Human: These threats include theft, vandalism of the infrastructure and/or hardware, disruption, accidental or intentional errors.
To protect computer systems from the above mentioned physical threats, an organization must have physical security control measures.
The following list shows some of the possible measures that can be taken:
Internal: Fire threats could be prevented by the use of automatic fire detectors and extinguishers that do not use water to put out a fire. The unstable power supply can be prevented by the use of voltage controllers. An air conditioner can be used to control the humidity in the computer room.
External: Lightning protection systems can be used to protect computer systems against such attacks. Lightning protection systems are not 100% perfect, but to a certain extent, they reduce the chances of Lightning causing damage. Housing computer systems in high lands are one of the possible ways of protecting systems against floods.
Humans: Threats such as theft can be prevented by use of locked doors and restricted access to computer rooms.
#share & #supportus
-------------------> @geekcode π
Share as more as π