GeekCode
793 subscribers
452 photos
3 videos
7 files
942 links
🍁Cyber Security ❀️
🍁Hacking Resources πŸ‘¨β€πŸ’»

Providing knowledge to people'sπŸ₯€
Nobody gets smaller by sharing knowledge
You can also share your knowledge with us...πŸ™‚πŸ™‚

πŸ“°Promotion/Query - @geekcodevipbot
Download Telegram
πŸ”° KeepSolid Premium VPN For 6 Months πŸ”°

Redeem Code in Old Account if you Already Have, Date will get Extended till 2022.

This VPN is Available for All Devices.
Create an Account here :
https://my.keepsolid.com/signup/

Sign in & Click on Redeem
Apply The Coupon

CODE : VPNUNLIMITED2020CHIP

#share & #supportus

----------------> @geekcode πŸ“

Share as more as 😍
This media is not supported in your browser
VIEW IN TELEGRAM
πŸ”₯ Best Tools to protect your online privacy these days πŸ”₯

Privacy should be the top priority of anyone doing their business online, especially on Telegram , Darknet

Most of you may know many of the tools mentioned in this post but I feel compiling a good list never hurts

Step 1 - VPN

Staying anonymous should be a second nature to everyone online. You can use free/paid software for that.
One should look for a VPN that does not keep logs and even the country they are based from is also know for pro-privacy rules.

Top free software:

TOR/TAILS
Your own proxy/vpn setup using linux scripts and VPS
Top paid VPN software:

iPredator (Sweden)
Mullvad (Sweden)
ProtonVPN (Switzerland)
ExpressVPN (British Virgin Islands)
NordVPN (Panama) - LQ but adding it

Step 2 - Emails

Use email providers that protect user privacy and also have encryption methods implemented in their mail system.
You can use any of the above emails to register on forums, buy subscriptions and even for personal use irl to protect your privacy:


Protonmail.com
Tutanota.com
Yandex.com
Posteo.de
Mailfence
Hushmail

Step 3 - Payments

Always try to use cryptocurrencies for payments, as much as you can. One should even consider using XMR (Monero) as it is completely anonymous and there is no public track on its blockchain. Howeven, If you use standard crypto, make sure you use a desktop version wallet and have taken a privacy steps first so you actually use it without exposing your real IP.

Step 4 - Purchasing Domains / Hosting

Njal.la is your best bet for domain registry. They use their own information to register the domain name for you. Fees are high, but worth every single cent when you view at this at the long term .


Best domain extensions for privacy:

Avoid using .com / .net / .org etc common domain extensions. Always try to use domain extensions from islands nations that are not covered by most digital worldwide laws.
Some examples include .is, .gd, .la
More info on domain extensions can be found on wikipedia here

Additional Pointers

1) Always get WHOIS privacy even if you'll have to pay extra for it

2) Use a sandbox / rdp to test any program and always scan (can use virustotal) and keep your system clean of malwares. Malwarebytes is a must and keys are not that expensive

3) It never hurts to use Virustotal to scan any programs etc for all kinds of stuff people jack in them

share & #supportus

----------------> @geekcode πŸ“

Share as more as 😍
This media is not supported in your browser
VIEW IN TELEGRAM
Fundamentals of Network Security

FREE For 48 Hrs

Concept on network Security, OSI model, Network Attack and protection.


ENROLL NOW -:

https://geekcode.com/network-fundamentals

#share & #supportus

------------------> @geekcodeπŸ“

Share as more as 😍
This media is not supported in your browser
VIEW IN TELEGRAM
πŸ—ƒ How to choose a VPN ? πŸ—³
━━━━━━━━━━━━━
The best way to stay secure when using public Wi-Fi is to use a VPN solution, like Norton Secure VPN, which is compatible with Android and iOS smartphones and tablets, as well as Windows PCs and Apple Macs. Here are some questions to ask when you’re choosing a VPN provider.

πŸ”΄ Do they respect your privacy?
The point of using a VPN is to protect your privacy, so it’s crucial that your VPN provider respects your privacy, too. They should have a no-log policy, which means that they never track or log your online activities.

πŸ”΄ Do they run the most current protocol?
OpenVPN provides stronger security than other protocols, such as PPTP.

πŸ”΄ Do they set data limits?
Depending on your Internet usage, bandwidth may be a large deciding factor for you. Make sure their services match your needs by checking to see if you’ll get full, unmetered bandwidth without data limits. Remember, some packages may not cost you money, but you’ll be subjected to frequent advertisements instead.

πŸ”΄ Where are the servers located?
Decide which server locations are important to you. If you want to appear as if you’re accessing the Web from a certain locale, make sure there’s a server in that country.

πŸ”΄ Will you be able to set up VPN access on multiple devices?
If you are like the average consumer, you use between three and five devices. Ideally, you’d be able to use the VPN on all of them at the same time.

πŸ”΄ What happens if the VPN goes down?
Be sure that your provider implements a kill switch system in the event of failure. This means that your connection would automatically be locked down and would not default to an unsecured Internet connection if something goes wrong.
━━━━━━━━━━━━━
#share & #supportus

------------------> @geekcodeπŸ“

Share as more as 😍
This media is not supported in your browser
VIEW IN TELEGRAM
🎭 Software Cracking :- Learn How To Crack Software Legally 🎭

Udemy Banned This Course

About Course :-
Crack Software Legally by Solving CrackMe Challenges whilst learning Reverse Engineering & Assembly Language the fun way.Learn To Crack Softwares Legally With This Latest Advance Software Cracking Course.

Topics Covered :-
🎯 How to crack software serial number keys
🎯 Remove Nag Screen Reminders asking you to register
🎯 Convert Trial Software to Fully Functional Software
🎯 Extend 30-day Trial Period Software
🎯 Learn Reverse Engineering and Assembly Language
🎯 How to Crack Software For Fun by solving CrackMe Challenges.
🎯 And Much More

Requirements Of Course :-
Size :- 7.61GB
Windows PC
Basic knowledge in C,
Assembly Language and Win32 API would be helpful but not mandatory

Download Link :-
https://mega.nz/folder/SsxRjCLJ#EBfWpc4K2C7kJpeHZPGG9w

#share & #supportus

----------------> @geekcode πŸ“

Share as more as 😍
This media is not supported in your browser
VIEW IN TELEGRAM
πŸ‘¨β€πŸ’»THE HOTTEST JOB IN TECH WORLD- PENETRATION TESTING, ALSO KNOWN AS ETHICAL HACKINGπŸ‘¨β€πŸ’»

PENETRATION TESTER MAIN RESPONSIBILITIES
β€’ Plan And Design Penetration Tests
β€’ Carry Out Tests And Other Simulations
β€’Creating Reports And Recommendations
β€’ Advise Management On Security
Improvements
β€’ Work With Other Employees To Improve Organizational Cybersecurity

πŸ’ Benifits
β€’MANY PEOPLE CONFUSE PENETRATION TESTING WITH VULNERABILITY TESTING. IN ACTUALITY, THESE TWO CYBERSECURITY SPECIALIZATIONS HAVE DISTINCT DIFFERENCES.
β€’PEN TESTERS SPEND MOST OF THEIR TIME CONDUCTING ASSESSMENTS AND RUNNING TESTS.
β€’ACCORDING TO PAYSCALE DATA FROM AUGUST 2020, THE AVERAGE PENETRATION TESTER SALARY IN THE U.S. SITS AT $84,690 PER YEAR.

#share & #supportus

----------------> @geekcode πŸ“

Share as more as 😍
This media is not supported in your browser
VIEW IN TELEGRAM
MICROSOFT EXCEL A-Z COURSE

https://www.udemy.com/course/microsoft-excel-from-a-z/

#share & #supportus

--------------------> @geekcode πŸ“

Share as more as 😍
This media is not supported in your browser
VIEW IN TELEGRAM
✨ MATLAB Programming Fundamentals ✨

https://mega.nz/file/dINkRRKS#bBnRq0B8-R1BozrDPjw3TP66gzEQcGw2_5h_oESSqd8

#share & #supportus

-----------------> @geekcode πŸ“

Share as more as 😍
This media is not supported in your browser
VIEW IN TELEGRAM
πŸ”° Database Breach , Check About breach here πŸ”°

Mostly all below are paid sites which require subscription to check the password for email BUT you can simply enter email & check whether that email's password has been leaked or not , if yes than in which DB it has been leaked

https://snusbase.com

https://leakcheck.net

https://leaked.site

https://leakcorp.com/login

https://haveibeensold.app

https://leak.sx

https://vigilante.pw

https://scatteredsecrets.com

https://nuclearleaks.com

https://www.dehashed.com

https://hashes.org

https://ploit.net

https://ghostproject.fr

https://private-base.info

https://www.babatools.net

https://leakth.is

https://leak-lookup.com

https://hacked-emails.com

https://www.hotsheet.com

http://www.leakeddata.cc

https://intelx.io

https://leakpeek.com

#share & #supportus

-----------------> @geekcode πŸ“

Share as more as 😍
This media is not supported in your browser
VIEW IN TELEGRAM
πŸ”°How to keep fingerprint lock to termuxπŸ”°#Termux

Let's get started:

1. Open your Termux.
2. First we need to install the extension itself. We write the commands one by one:
pkg update && upgrade
pkg install git
git clone https://github.com/MrAlpha786/termux-fingerprint-lock
cd termux-fingerprint-lock
chmod +x *
3. And run:
setup
4. Now, if we did everything right, Termux will ask us to put our finger on. We apply and you're done.

After that, every time we log into Termux, we need to unlock it with a fingerprint.

#share & #supportus

-----------------> @geekcode πŸ“

Share as more as 😍
This media is not supported in your browser
VIEW IN TELEGRAM